Recently, Google uncovered that various threat actors, ranging from nation-state adversaries to financially motivated groups, have been exploiting a critical security vulnerability in WinRAR to gain...
An orchestrated assault on Poland’s electricity grid in late December specifically targeted numerous distributed energy resource (DER) locations throughout the nation, including combined heat and power...
AI Agents: A Compliance and Security Challenge in Modern Enterprises In the ever-evolving landscape of modern enterprises, compliance frameworks that were once built on the assumption...
The Critical Fortinet FortiCloud SSO Authentication Bypass Vulnerability Fortinet recently confirmed the existence of a critical vulnerability in FortiCloud’s single sign-on (SSO) authentication system, known as...
OpenAI is considering introducing advertisements on ChatGPT for users in the United States who have a free or $8 Go subscription. However, the cost of these...
Mustang Panda, a Chinese cyber espionage group, has recently upgraded its CoolClient backdoor to a new version capable of extracting login information from web browsers and...
WhatsApp Introduces New “Strict Account Settings” for Enhanced Cybersecurity WhatsApp is set to launch a new feature called “Strict Account Settings” that aims to provide additional...
Nike Investigating Potential Cyber Security Incident After Data Leak Nike is currently looking into what it has described as a “potential cyber security incident” following the...
Malware Service “Stanley” Offers Malicious Chrome Extensions A new malware service known as ‘Stanley’ has emerged, offering malicious Chrome extensions that can bypass Google’s review process...
When it comes to cybersecurity, one thing remains constant: adversaries are always evolving. The emergence of offensive AI is revolutionizing attack techniques, making them more difficult...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.