News

Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected ...
DDoS attacks historically relied on volume and persistence. But if AI is embedded in the attacker's toolkit, the rules change ...
Regularly scan for any new AI services or features popping up in your SaaS environment, and evaluate any updates to vendors' ...
State-backed hackers breached Southeast Asia telecoms using advanced tools—no data stolen, but stealth access achieved.
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
The ongoing campaign, first detected in early 2025, is designed to use the OAuth applications as a gateway to obtain ...
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...
Akira ransomware exploits SonicWall SSL VPNs, hitting patched devices. Organizations face risks from possible zero-day flaw.
In the npm ecosystem, postinstall scripts are often overlooked attack vectors—they run automatically after a package is ...
UNC4899 used job lures and cloud exploits to breach two firms, steal crypto, and embed malware in open source.
Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to ...
The solution lies in fundamentally reimagining security data architecture around what AI models actually need to perform ...