January 2026 was a wake-up month for enterprise security teams. In a single week, CERT-In released three high-severity ...
The news this week has struck at the very foundation of WhatsApp's existence. A massive class-action lawsuit filed in San ...
This has given rise to the “security poverty line,” a term attributed to Wendy Nather, senior research initiatives director at 1Password LLC. There is a growing belief within the cybersecurity ...
ClickFix uses fake CAPTCHAs and a signed Microsoft App-V script to deploy Amatera stealer on enterprise Windows systems.
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
LayerX discovered 16 extensions in the Chrome Web Store and Microsoft Edge Add-ons marketplace that steal users’ ChatGPT ...
Clawdbot can automate large parts of your digital life, but researchers caution that proven security flaws mean users should ...
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ...
The disclosure underscores how recovery keys stored in Microsoft’s cloud can be accessed under warrant, even when enterprise ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results