News

Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an ...
ClickFix abuses clipboards. FileFix hijacks File Explorer. Both social engineering attacks start in the browser—and end in malware. See how Keep Aware stops these stealthy attacks before they break ...
Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted ...
Proton has launched Proton Authenticator, a free standalone two-factor authentication (2FA) application for Windows, macOS, ...
A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters ...
The Python Software Foundation warned users this week that threat actors are trying to steal their credentials in phishing ...
The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram Micro, allegedly stolen from the company's compromised systems earlier this month.
Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme ...
The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank's network to bypass ...
Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks ...
Lenovo is warning about high-severity BIOS flaws that could allow attackers to potentially bypass Secure Boot in all-in-one desktop PC models that use customized Insyde UEFI (Unified Extensible ...