A group of researchers has discovered a set of vulnerabilities called AirBorne, which would allow any hacker on the same Wi-Fi network as a device using third-party AirPlay to covertly execute their own code on that device.
Vulnerabilities in browsers render data loss prevention (DLP) tools ineffective against the emergence of new data exfiltration attacks.
Major sporting events often provoke attacks.
The UK government has decided to ban ransomware payments in the public sector.
Geopolitics is transforming the field of cybersecurity, where new approaches focused on resilience and deterrence are emerging.
Researchers have discovered a method to execute code remotely and without the need for authentication.
Companies are facing an increased risk of data breaches as millions of computers are about to stop receiving updates for Windows 10.
A Linux kernel, disabled in Android and ChromeOS, is causing issues.
Okta has detected an increase in the campaign from the Democratic People's Republic of Korea.
The largest healthcare provider in Connecticut reported that it suffered a ransomware attack in March.
Cases of hackers impersonating Bloomberg and Zoom have been reported.
The renowned Chinese group employed completely new tools.
Users with devices that are at the end of their life cycle should completely disable the feature.
Researchers have unveiled a complicated scheme.
Normally, its price is $199.
A judge in the United States rules against the practice of "tower dumps" by police in relation to mobile phones. Additionally, China identifies alleged NSA agents whom it accuses of being involved in cyberattacks. Meanwhile, the Customs and Border Protection Office reveals its social media surveillance tools.
The former cybersecurity chief is the latest to oppose the Trump administration over its approach toward critics and dissenters.
Proactive artificial intelligence is already present, but without proper API management, security risks will continue to be an issue.
Artificial intelligence does not always make mistakes when confusing open-source packages, and these errors can be analyzed and understood.
The car rental company attributed the breach to Cleo, whose customers suffered a data theft by a ransomware group in 2024.
Despite presenting themselves as a group of hacktivists, CyberAv3ngers is an unusual band of state-backed hackers whose objective is to threaten industrial infrastructure, having already caused disruptions on a global scale.
Every month, millions of fraudulent text messages are sent. The Chinese cybercriminals responsible for much of this messaging are expanding their activities and innovating rapidly.
It is suspected that TraderTraitor, a group of cybercriminals from North Korea, is responsible for the theft of 1.5 billion dollars in cryptocurrency from a single exchange, making it one of the most sophisticated cybercrime groups in the world.
Chinese officials have privately acknowledged their responsibility for the intrusions.
Additionally, the Department of Homeland Security begins monitoring social media of immigrants, President Donald Trump focuses on the former director of CISA who debunked his claims about fraud in the 2020 elections, among other topics.