The United States Department of Homeland Security is undergoing a significant restructuring of its technology leadership, with the departure of two senior cybersecurity officials as part...
Cybersecurity researchers at Microsoft have warned that North Korean cyber threat groups are increasingly using generative artificial intelligence to scale up sophisticated schemes involving fake remote...
new cybersecurity report from Google reveals that 90 zero-day vulnerabilities were actively exploited in 2025, with almost half of them targeting enterprise technologies. The findings highlight...
Belgian cybersecurity expert Inti De Ceukelaire never set out with the goal of becoming a hacker. Yet over time, his curiosity and determination transformed him into...
A sophisticated iOS exploit toolkit known as Coruna has been identified as a key component behind a growing wave of cyberattacks targeting Apple devices worldwide. Security...
Cybersecurity researchers are warning of a fast-moving threat campaign in which attackers impersonate IT support staff to deploy a customized version of the Havoc command-and-control (C2)...
The Cybersecurity and Infrastructure Security Agency (CISA) is undergoing a leadership transition as Madhu Gottumukkala departs his role as acting director. Nick Andersen, currently the agency’s...
Recent research by Truffle Security has revealed a significant security gap affecting thousands of Google Cloud API keys. Originally designed as project identifiers primarily for billing...
A senior Secret Service official has raised alarms over a largely overlooked vulnerability in the global internet infrastructure that is being exploited by cybercriminals, particularly for...
LastPass has alerted users about an active phishing campaign impersonating the popular password management service, aiming to steal users’ master passwords through fake maintenance notifications. The...