News
As synthetic audio continues to improve, it's also getting harder for anti-spoofing models to accurately detect. That's according to recent research published on June 1 by a team of researchers at ...
A vulnerability found in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments ...
A new type of wiper malware was used in a destructive cyberattack on a critical infrastructure organization in Ukraine. According to a report Thursday from Cisco Talos, the previously unknown malware, ...
Data has long been at the heart of nearly every organization. But as organizations adopt increasingly sophisticated artificial intelligence (AI) tools, the challenges around accessing and using ...
F5 this week announced the acquisition of Fletch, a San Francisco-based startup with agent-based artificial intelligence (AI) technology that analyzes massive amounts of threat intelligence data and ...
A phishing group named "Haozi" is selling turnkey phishing infrastructure to amateur attackers — no commands needed. Security vendor Netcraft today published research concerning the Chinese-language ...
When the BlackTech cyber-espionage group planted malware in a firm providing telecommunications services for the 2022 FIFA World Cup, the China-linked threat group was largely unknown. Soon, it had ...
An Iranian cyber-espionage group hid in a target's network for nearly a decade before being detected. ESET published research today concerning "BladedFeline," an Iranian advanced persistent threat ...
Across industries, organizations are facing increasing pressure to protect their rapidly expanding digital ecosystems. The rising popularity of hybrid cloud environments and remote work have increased ...
A week after ConnectWise disclosed that a threat actor had gained access to its environment and targeted customers, questions remain about the vulnerability used by the attacker, and confusion remains ...
Despite the recent international operation that took down the info-stealing malware known as LummaC2 (aka Lumma Stealer), the malware continues to operate in some capacity. However, a new stealer ...
Tenable Security has announced plans to acquire Apex, an Israel-based startup specializing in security solutions driven by artificial intelligence (AI). Apex will be integrated into Tenable One, ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results