News

SecAlliance highlighted the evolution in smishing campaigns orchestrated by Chinese syndicates, which exploit digital wallet ...
Experts, including Allan Friedman, CISA's leading voice on SBOMs until July 2025, emphasized that AI BOMs should be standardized before being implemented ...
Critical vulnerabilities in NVIDIA's Triton Inference Server, discovered by researchers, could allow unauthenticated ...
IANS found that stagnant budget growth rates have significantly impacted CISOs ability to increase their teams’ headcount ...
SecurityScorecard analysis highlights wide variety of Iranian threat actors and coordination with military activity ...
AI tools helped to defraud a record number of victims in the first half of the year, although many legitimate customers also ...
Python-based PXA Stealer has stolen data from more than 4000 victims in over 62 countries, according to SentinalLabs ...
A significant increase in web traffic to AI-related websites has marked a shift in how users interact with artificial ...
Cybersecurity startups are at the forefront of new technologies and tackling emerging challenges, and security leaders should ...
In all of the cases observed by the security vendor, threat actors achieved VPN access through SonicWall SSL VPNs. There then ...
The Pwn2Own competition is offering a $1m reward to any teams able to unearth a WhatsApp code execution exploit ...
Microsoft has observed Russian state actor Secret Blizzard using an AiTM position to gain initial access, assisted by ...