News

Virtual event brings together leading experts, practitioners, and innovators for a full day of insightful discussions and ...
The malicious code is hidden within a CDATA section of the SVG file and relies on a static XOR key to decrypt a payload at runtime. The decrypted code reconstructs a redirect command and builds a ...
Cloudflare has published its quarterly DDoS threat report for Q2 2025 and the company says it has blocked millions of attacks ...
Sesame Workshop regained control of its Elmo account on the X platform Monday after a hacker gained access and posted a string of racist and antisemitic messages.
Zip Security’s Series A funding round led by Ballistic Ventures will help the company grow its engineering and go-to-market teams.
DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack.
The MITRE AADAPT framework provides documentation for identifying, investigating, and responding to weaknesses in digital asset payments.
A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.
CISA considers the recently disclosed CitrixBleed 2 vulnerability an unacceptable risk and has added it to the KEV catalog.
Google Gemini for Workspace can be tricked into displaying a phishing message when asked to summarize an email.
The Interlock ransomware group has partnered with the KongTuke TDS to distribute a new RAT variant via FileFix attacks.
Vulnerabilities in Gigabyte firmware implementations could allow attackers to disable Secure Boot and execute code.