News
Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted ...
Google’s Project Zero team will provide limited details of new vulnerabilities early following discovery, in a bid to speed ...
Google has announced that it's making a security feature called Device Bound Session Credentials (DBSC) in open beta to ...
Unpatched Apple devices remain exposed to Sploitlight, a macOS flaw that allows unauthorized access to private user data ...
Microsoft has disclosed a critical vulnerability in macOS that allows attackers to bypass core privacy protections and steal ...
Reportedly, Microsoft has disclosed a macOS flaw dubbed 'Sploitlight' that could have let attackers access highly sensitive ...
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to ...
"A leak happened here somewhere," Dustin Childs, head of threat awareness at Trend Micro's Zero Day Initiative (ZDI), told ...
Congress and the Trump Administration Must Fix a Ruling prohibiting private companies from retroactively authorizing access ...
This paper proposes a coordinated emergency response scheme for the secure operation and mutual coordination of electricity-watershed networks under spatio-temporal heterogeneity and volatility of ...
A recently discovered cyber-espionage campaign exploiting Microsoft SharePoint server software has compromised about 100 ...
The zero-day exploit reveals persistent gaps in enterprise patch management and cyber hygiene, as over 8,000 servers remain exposed days after disclosure, suggesting broad organizational ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results