Experts uncovered a new Osiris ransomware strain that used a custom POORTRY driver in a BYOVD attack to disable security tools & steal data in 2025.
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
Multiple security vulnerabilities endanger IBM's database management system Db2. Primarily, instances can crash.
Unlike traditional attacks that rely on exploits, this succeeds through social engineering combined with abuse of Windows' own security architecture.
Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks exploiting a critical authentication bypass vulnerability in the GNU InetUtils ...
Google has launched an artificial intelligence (AI)-powered security capability that acts as a last line of defence against ransomware attacks that have evaded traditional security measures and ...
Cloud-based developer tools such as Jupyter Notebook and Selenium Grid are constantly under attack, warns Max Heinemeyer, global field chief information security officer (CISO) at cyber security ...
The National Institute of Standards and Technology issued new encryption standards in 2022 that are expressly designed to withstand quantum computing attacks.