The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
LexisNexis has confirmed a data breach after hackers leaked data allegedly stolen from its systems, but impact is limited.
Europol, Microsoft, and cybersecurity companies announced the takedown of the widely used phishing-as-a-service platform ...
JetStream Security launched with $34 million in seed funding to help organizations gain visibility into AI assets across ...
CVE-2026-22719, a recently patched vulnerability in VMware Aria Operations, has been exploited in the wild, CISA warned.
LastPass is warning users of a new phishing campaign that aims to trick them into handing over their master password.
A critical-severity FreeScout vulnerability can be exploited for remote code execution without authentication or user interaction.
Starting September 2026, Google will release new major Chrome iterations every two weeks to minimize disruptions and simplify debugging.
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) and Intigriti (2016) in Europe. Used correctly, bounty platforms take away ...
The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026.
Webinar: How an OT SOC delivers continuous visibility and cyber resilience across critical infrastructure sectors.
Preventing of the consequence of cracked or pirated software focuses on user awareness training to recognize the threat.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results