News
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of ...
OtterCookie v3 has been found to incorporate a new upload module to send files matching a predefined set of extensions to the ...
The current approach to vulnerability management is rooted in its name: focusing on "vulnerabilities" (as defined by CVE, ...
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown ...
"The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and ...
Dutch and U.S. law enforcement have dismantled a long-running criminal proxy botnet powered by over 7,000 infected IoT and ...
Recent data shared by Group-IB shows that disclosures on Qilin's data leak site have more than doubled since February 2025, ...
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences ...
China-based hackers exploited SAP flaw CVE-2025-31324 since April 29, impacting global industries via web shells.
MirrorFace deployed ROAMINGMOUSE and updated ANEL malware in March 2025 to target Japan and Taiwan's government systems ...
Malicious npm packages targeting Cursor macOS users stole credentials and disabled updates, impacting 3,200+ downloads.
CVE-2025-32819 (CVSS score: 8.8) - A vulnerability in SMA100 allows a remote authenticated attacker with SSL-VPN user ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results