Welcome!

Unlock your personalized experience.
Sign Up

Cybersecurity

GM agrees to $12.75M California settlement over sale...

California Attorney General Rob Bonta announced a proposed $12.75 million set...

Tech Can't Stop These Threats — Your People Can

Security controls can do only so much. Here are four attacks where your emplo...

FCC Softens Ban on Foreign-Made Routers

The Federal Communications Commission eased some restrictions and pushed back...

New GhostLock tool abuses Windows API to block file ...

A security researcher has released a proof-of-concept tool named GhostLock th...

Official CheckMarx Jenkins package compromised with ...

Checkmarx warned over the weekend that a rogue version of its Jenkins Applica...

Hackers Used AI to Develop First Known Zero-Day 2FA ...

Google on Monday disclosed that it identified an unknown threat actor using a...

cPanel CVE-2026-41940 Under Active Exploitation to D...

A threat actor named Mr_Rot13 has been attributed to the exploitation of a re...

TeamPCP Compromises Checkmarx Jenkins AST Plugin Wee...

Checkmarx has confirmed that a modified version of the Jenkins AST plugin was...

'Dirty Frag' Exploit Poised to Blow Up on Enterprise...

The privilege escalation vulnerability, which is similar to other Linux flaws...

Why Changing Passwords Doesn’t End an Active Directo...

Resetting a password doesn't always remove attackers from Active Directory. S...

Instructure confirms hackers used Canvas flaw to def...

Education technology giant Instructure has confirmed that a security vulnerab...

⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer...

Rough Monday. Somebody poisoned a trusted download again, somebody else turne...

LLMs and Text-in-Text Steganography

Turns out that LLMs are really good at hiding text messages in other text mes...

Hackers Use AI for Exploit Development, Attack Autom...

Cyber adversaries have long used AI, but now attackers are using large langua...

Webinar this week: Prevention alone is not enough ag...

This upcoming webinar explores how organizations need to combine security, ba...

Google: Hackers used AI to develop zero-day exploit ...

Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day ex...