Cybersecurity researchers at Microsoft have warned that North Korean cyber threat groups are increasingly using generative artificial intelligence to scale up sophisticated schemes involving fake remote...
new cybersecurity report from Google reveals that 90 zero-day vulnerabilities were actively exploited in 2025, with almost half of them targeting enterprise technologies. The findings highlight...
Belgian cybersecurity expert Inti De Ceukelaire never set out with the goal of becoming a hacker. Yet over time, his curiosity and determination transformed him into...
A sophisticated iOS exploit toolkit known as Coruna has been identified as a key component behind a growing wave of cyberattacks targeting Apple devices worldwide. Security...
Cybersecurity researchers are warning of a fast-moving threat campaign in which attackers impersonate IT support staff to deploy a customized version of the Havoc command-and-control (C2)...
The U.S. government has issued an urgent cybersecurity warning after adding a critical VMware vulnerability to its list of actively exploited threats. The Cybersecurity and Infrastructure...
Google has announced a major step toward protecting the web from future quantum computing threats by developing a new HTTPS certificate model for its Google Chrome...
A serious security vulnerability in Google Chrome has been patched after researchers revealed it could allow malicious browser extensions to escalate privileges and access sensitive system...
When a SaaS platform starts scaling, rising traffic is usually a welcome sign. More users, more API calls, more sessions — everything points to growth. But...
This week’s developments reveal a broader shift in the cyber threat landscape. Rather than a single headline-grabbing breach, security researchers tracked a steady stream of attacks...