Security researchers at Barracuda Networks have identified new phishing techniques involving QR codes, termed 'quishing' attacks. These methods inc...
Application Security Posture Management (ASPM) tools are gaining importance as enterprises seek comprehensive solutions to secure applications acro...
Michael Bargury, CTO of Zenity, presented his research on AI enterprise compromise methods at Black Hat USA 2025. He highlighted the growing capabi...
Bragg Gaming Group, a prominent provider of gaming content and technology solutions, disclosed a cyberattack on its internal systems over the weeke...
Two hackers, known as Saber and cyb0rg, have exposed a North Korean government hacker involved in cyber espionage operations. They accessed the hac...
The cybersecurity sector is facing a critical shortage of skilled professionals, as cyber threats continue to escalate globally. Experts highlight ...
Russian state-sponsored cyber actors, linked to the Federal Security Service (FSB), have been conducting a decade-long espionage campaign targeting...
CyberProof's Managed Detection and Response team has reported a significant cyber threat involving compromised USB devices used to deploy cryptomin...
A new exploit has been released targeting SAP NetWeaver instances, chaining two critical-severity vulnerabilities, CVE-2025-31324 and CVE-2025-4299...
The European Union is exploring ways to reduce its reliance on American technology companies, such as Google, Microsoft, and Amazon, which currentl...