This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to ...
From sophisticated nation-state campaigns to stealthy malware lurking in unexpec...
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive d...
Cybersecurity researchers are calling attention to an incident in which the popu...
Cybersecurity researchers have warned of a malicious campaign targeting users of...
A 51-year-old dual Russian and Israeli national who is alleged to be a developer...
The GSM Association (GSMA) has formally announced support for end-to-end encrypt...
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware a...
Most microsegmentation projects fail before they even get off the ground—too com...
Users searching for pirated software are the target of a new malware campaign th...
A new malware campaign has been observed leveraging social engineering tactics t...
Microsoft has shed light on an ongoing phishing campaign that targeted the hospi...
The North Korea-linked threat actor known as ScarCruft is said to have been behi...
Two high-severity security flaws have been disclosed in the open-source ruby-sam...
As IT environments grow more complex, IT professionals are facing unprecedented ...
Meta has warned that a security vulnerability impacting the FreeType open-source...