A hacker group linked to Iran is accused of targeting Stryker, a major US medical technology company, allegedly wiping devices through Microsoft systems.
Dangling DNS, a long-standing vulnerability, is now being weaponized by AI, enabling automated data exfiltration pipelines and sophisticated attacks.
QR codes offer modern convenience, but also present new avenues for scams. Discover how malicious actors exploit QR codes and practical steps to protect your personal data and financial information from sophisticated 'quishing' attacks.
Critical vulnerabilities found in four popular Visual Studio Code extensions with 128 million downloads exposed developers to file theft and remote code execution.
Palo Alto Networks has acquired Israeli startup Koi to enhance its agentic endpoint security capabilities, integrating the technology into its Prisma AIRS platform.
Microsoft research reveals a benign-sounding prompt can strip safety guardrails from 15 major AI models, highlighting risks in enterprise customization.
A recent SoundCloud data breach exposed nearly 30 million users' email addresses and profile data, leading to potential phishing and impersonation risks.
Anthropic's new AI model, Claude Opus 4.6, has identified hundreds of critical software vulnerabilities, signaling a new era in cybersecurity.
Leading experts confirm AI system capabilities are rapidly advancing, but current safety testing and risk management protocols are failing to keep pace.
Organizations face an urgent need for quantum-safe encryption to protect sensitive data from future quantum decryption capabilities, despite current low readiness levels.
Newly discovered zero-day vulnerabilities in npm and Yarn could allow attackers to bypass existing defenses, enabling widespread malicious worm attacks like Shai-Hulud.
A deep dive into Agent Name Service (ANS) and its role in establishing a robust trust infrastructure for autonomous AI systems, preventing cascading failures.
A newly discovered vulnerability allowed attackers to exploit Microsoft Copilot through malicious links, potentially exposing sensitive user data without direct interaction.
Leading AI coding platforms consistently produce insecure code, including critical vulnerabilities, according to new research highlighting the need for enhanced oversight.
OpenAI details ongoing challenges with prompt injection attacks on AI browsers, emphasizing the need for robust security measures and user vigilance.
Mac malware campaign uses fake AI chat results to deliver AMOS through terminal commands, security researchers report. Attackers exploit trust in AI-generated cleanup guides.
IBM urges immediate patching for a critical vulnerability in its API Connect platform, which could allow unauthorized remote attackers to bypass authentication and gain access.
Explore how data-driven collaboration strengthens cybersecurity defenses, addressing data quality and consistency challenges to foster more resilient partnerships.
A critical remote code execution flaw, React2Shell, in the React 19 library created significant challenges for web application security.
Ransomware attacks in 2025 have caused business operations to cease for weeks and months at a time, resulting in massive financial losses in organizations around the globe.
A new study reveals cybersecurity teams are shifting their focus from headcount shortages to critical skill gaps, particularly with AI, increasing breach risks.
New research reveals that exposed GitHub Personal Access Tokens are providing attackers with a direct path into enterprise cloud environments.
Effective management of AI agent memory is crucial for enterprise security and operational integrity, requiring a shift from temporary storage to robust database practices.
Chinese state-sponsored threat actors are employing a sophisticated Go-based malware, BRICKSTORM, to establish long-term persistence in VMware vCenter and ESXi servers.
Explore advanced strategies for defending against npm supply chain attacks, focusing on YARA rule integration and proactive security measures in development workflows.
A recent discovery by threat intelligence firm Synthient reveals an unprecedented exposure of 1.3 billion unique passwords and 2 billion email addresses, underscoring urgent security measures.
Five critical vulnerabilities in Fluent Bit, a widely used log processor, could lead to full cloud takeover, data manipulation, and remote code execution.
Ransomware operators are increasingly targeting Amazon Web Services S3 buckets, exploiting cloud-native encryption and key management services to disrupt organizations.
Microsoft's Azure platform successfully mitigated its largest distributed denial-of-service attack to date, a 15.72 Tbps strike targeting an Australian cloud endpoint.
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities in AI inference server frameworks from Meta, Nvidia, and Microsoft.
Microsoft details Storm-2657 cybercriminals' phishing campaign, targeting thousands at universities to steal payroll credentials and divert funds.
SAMSUNG 870 EVO 4TB SATA III SSD delivers 560/530 MB/s speed, high endurance, AES 256-bit encryption, and proven reliability for NAS and PC storage.
TP-Link Omada EAP773 WiFi 7 tri-band access point with 10G port delivers high-speed, business-grade wireless, seamless roaming, and Omada cloud management.
CORSAIR Vengeance 16GB DDR5 SODIMM RAM boosts laptop and small PC performance, delivering high speed, reliability, and easy installation.
Samsung 990 EVO Plus 4TB M.2 NVMe SSD delivers up to 7,250/6,300 MB/s read/write speeds, exceptional thermal control, and dual PCIe 4.0 x4 / 5.0 x2 compatibility.