News

It’s not uncommon for threat actors to target Trend Micro product vulnerabilities in their attacks. CISA’s Known Exploited ...
Many companies are showcasing their products and services this week at the 2025 edition of the Black Hat conference in Las ...
Airlines Air France and KLM have disclosed a data breach stemming from unauthorized access to a third-party platform.
A desync attack method leveraging HTTP/1.1 vulnerabilities impacted many websites and earned researchers more than $200,000 ...
In addition to the CyberArk product vulnerabilities, Cyata researchers discovered flaws in another widely used secrets ...
A Google Salesforce instance may have been targeted as part of a ShinyHunters campaign that hit several major companies.
Zenity shows AI assistants such as ChatGPT, Copilot, Cursor, Gemini, and Salesforce Einstein can be abused using specially ...
New research introduces behavioral fingerprinting to spot attackers just after login — before they hide or cause damage.
CISA and Microsoft have issued advisories for CVE-2025-53786, a high-severity flaw allowing privilege escalation in cloud environments.
WhatsApp removed 6.8 million accounts that were “linked to criminal scam centers” targeting people online around that world, Meta said.
Adobe has released urgent security updates to resolve two AEM Forms vulnerabilities for which proof-of-concept (PoC) code ...
ReVault vulnerabilities in the ControlVault3 firmware in Dell laptops could lead to firmware modifications or Windows login ...