News

TikTok Shop users are targeted in a phishing and malware campaign using 15,000 fake sites. Data and crypto thefts surge.
Huntress said it detected around 20 different attacks tied to the latest attack wave starting on July 25, 2025, with ...
NVIDIA's August bulletin for Triton Inference Server also highlights fixes for three critical bugs (CVE-2025-23310, ...
mDNS and DNS spoofing are common tactics that trick devices into trusting malicious sources. Attackers exploit mDNS on local ...
Everyone's an IT decision-maker now. The employees in your organization can install a plugin with just one click, and they don't need to clear it with your team first. It's great for productivity, but ...
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
DDoS attacks historically relied on volume and persistence. But if AI is embedded in the attacker's toolkit, the rules change ...
Regularly scan for any new AI services or features popping up in your SaaS environment, and evaluate any updates to vendors' ...
State-backed hackers breached Southeast Asia telecoms using advanced tools—no data stolen, but stealth access achieved.
Pillar Security unveils full-lifecycle AI platform securing assets from design to runtime—critical for safe AI deployment.
Russian APT Secret Blizzard uses ISP-level AitM attacks to deploy ApolloShadow malware on embassy devices in Moscow.
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...