IoT devices can potentially be compromised in droves, thanks to gaps in cloud management interfaces for firewalls and routers ...
Enabling organizations to provide ethical hackers with legal protection and financial rewards for identifying security flaws.
A malware campaign presents fake websites that can check if a visitor is a victim or a researcher, and then proceed accordingly to defraud or evade ...
As vulnerabilities in the Common Vulnerabilities and Exposures ecosystem pile up, one Black Hat presenter hopes for a global, distributed alternative.
Five individuals admitted to helping threat actors get hired at US companies by providing false identities and remote access ...
Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor's ...
A critical Fortinet FortiWeb vulnerability capable of remote code execution has been exploited in the wild.
A self-replicating attack led to a tidal wave of malicious packages in the NPM registry, targeting tokens for the tea.xyz ...
CISOs must translate technical risks into business terms and position cybersecurity as a strategic business enabler.
In 2025, employees are still using weak passwords. Instead of forcing an impossible change, security leaders are working ...
The African country aims to train 1 million workers in tech skills in the short term, with a focus on software engineering, ...
An APT hammered critical bugs in Citrix NetScaler (CVE-2025-5777) and Cisco ISE (CVE-2025-20337) in a sign of growing ...