This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Apple has released security updates to address several security flaws, including...
The maintainers of the open-source continuous integration/continuous delivery an...
Cybersecurity researchers have discovered a new Apple macOS backdoor called Spec...
Google Cloud has addressed a medium-severity security flaw in its platform that ...
A new malware loader is being used by threat actors to deliver a wide range of i...
Peach Sandstorm, an Iranian Hackers group, targets diverse sectors globally
Indian government entities and the defense sector have been targeted by a phishi...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on ...
A post-exploitation tampering technique has been discovered that allows the malw...
A collection of security flaws in the firmware implementation of 5G mobile netwo...
Meta has officially begun to roll out support for end-to-end encryption (E2EE) i...
Chipmaker Qualcomm has released more information about three high-severity secur...
A new "post-exploitation tampering technique" can be abused by malicious actors ...
A new attack chain campaign has been discovered, which involves the exploitation...
In 2023, the global average cost of a data breach reached $4.45 million. Beyond ...
A new set of 48 malicious npm packages have been discovered in the npm repositor...