Scientists from the University of North Carolina have developed a method called TPUXtract, which enables the reconstruction...
Microsoft specialists report the blocking of approximately 7,000 password-based attacks every second — nearly double the number...
The cyber group Clop has claimed responsibility for the recent attacks on Cleo Harmony, VLTrader, and LexiCom...
Since August 2023, hackers have clandestinely exploited a zero-day vulnerability in DrayTek routers to compromise devices, steal...
The Japanese publishing house Kadokawa reportedly paid approximately $2.98 million in cryptocurrency to a hacker group following...
The Canadian company Care1, specializing in the application of artificial intelligence in ophthalmology, has found itself embroiled...
The company Vestrans has disclosed a significant cyberattack in which an attacker exploited a vulnerability in the...
A federal court in Missouri has indicted 14 North Korean nationals for illicitly securing employment with U.S....
Cybersecurity researchers have uncovered a sophisticated new Linux rootkit named PUMAKIT, designed to conceal its presence, escalate...
The Romanian National Cybersecurity Directorate (DNSC) has reported a ransomware attack by the LYNX group targeting the...
Vulnerabilities have been discovered in the media systems of Skoda vehicles, allowing remote control of certain car...
Cybersecurity researchers warn of data leakage risks and attacks targeting servers leveraging the Prometheus monitoring tool. According...