The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog, adding...
Security
Cryptocurrency exchange Coinbase has faced a serious security incident involving the leak of customer data. According to...
The Tor Project team has unveiled a new utility named oniux, designed to enforce network isolation for...
Since 2023, the hacker collective APT28 has been conducting a sweeping cyber-espionage operation known as RoundPress, aimed...
Malicious actors have once again targeted the npm ecosystem, this time through a package named “os-info-checker-es6”, which...
The House of Dior has suffered a data breach involving the personal information of customers from its...
Samsung Corporation has released a security update for MagicINFO 9 Server, addressing a critical vulnerability—CVE-2025-4632—that has already...
Google Threat Intelligence has published a new set of advanced threat-hunting techniques aimed at uncovering malicious .desktop...
Adobe has released unscheduled security updates for Photoshop 2024 and 2025, addressing three critical vulnerabilities—CVE-2025-30324, CVE-2025-30325, and...
The young men in the photographs are smiling, playing football, sipping sparkling wine, and posing beside swimming...
On May 14, 2025, the President of Tajikistan, Emomali Rahmon, signed into law the “Amendments to the...
The group known as Earth Ammit, affiliated with Chinese-speaking APT entities, conducted two waves of targeted attacks...
Google has announced a sweeping enhancement of Android 16’s security architecture, designed to combat spyware and sophisticated...
A research team from ETH Zurich has uncovered a new architectural-level vulnerability affecting all modern Intel processors...
The North Korean hacking group Konni—also known as Opal Sleet and TA406—which maintains ties to the DPRK...