A cyberattack on the European operator of IKEA stores cost the company tens of millions of dollars....
Security
Following a high-profile FBI raid earlier this year, the infamous hacker forum Cracked.io has resurfaced under a...
A new tool has emerged on the dark web for cybercriminals—Xanthorox AI, a system that boldly brands...
The era of AI-powered code generation tools has not only simplified the lives of developers but also...
TROX Stealer, first identified in December 2024, stands as a striking example of a sophisticated malware campaign...
Experts at Expel have uncovered a novel tactic employed by the cybercriminal group known as Atlas Lion,...
The Australian Securities and Investments Commission (ASIC) has announced the liquidation of 95 companies suspected of involvement...
Hackers are actively exploiting a zero-day vulnerability to compromise secure Gladinet CentreStack file-sharing servers. According to a...
Hackers have begun exploiting a critical vulnerability in the widely used WordPress plugin OttoKit (formerly known as...
Software supply chain attacks are becoming increasingly sophisticated, with malicious actors disguising harmful code as legitimate libraries...
In September 2024, NVIDIA released a security update addressing the critical vulnerability CVE-2024-0132 in its Container Toolkit....
The days when obtaining credentials using Mimikatz was trivially easy are rapidly becoming a thing of the...
Fortinet has addressed a critical vulnerability in its FortiSwitch devices that allowed remote attackers to change administrator...
March 2025 witnessed a renewed surge in cybercriminal activity, concentrated along two principal vectors: mass scanning of...
Small businesses in the United Kingdom lose approximately £3.4 billion ($4.35 billion) annually due to insufficient cybersecurity...