Cybersecurity Articles

Student Loan Breach Exposes 2.5M Records

Student Loan Breach Exposes 2.5M Records

Watering Hole Attacks Push ScanBox Keylogger

Watering Hole Attacks Push ScanBox Keylogger

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Ransomware Attacks are on the Rise

Ransomware Attacks are on the Rise

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Jailbreak Anthropic's new AI safety system for a $15,000 reward

Jailbreak Anthropic

The best malware removal software of 2025: Expert tested and reviewed

The best malware removal software of 2025: Expert tested and reviewed

Microsoft 365 is dumping its VPN - try these alternatives instead

Microsoft 365 is dumping its VPN - try these alternatives instead

Is Apple launching an AirTag 2 this year? Here's what we know

Is Apple launching an AirTag 2 this year? Here

Deepseek's AI model proves easy to jailbreak - and worse

Deepseek

Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden

Meet the Hired Guns Who Make Sure School Cyberattacks Stay Hidden

Foreign Hackers Are Using Google’s Gemini in Attacks on the US

Foreign Hackers Are Using Google’s Gemini in Attacks on the US

DeepSeek’s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot

DeepSeek’s Safety Guardrails Failed Every Test Researchers Threw at Its AI Chatbot

Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

The Trial at the Tip of the Terrorgram Iceberg

The Trial at the Tip of the Terrorgram Iceberg

Dynatrace strengthens cloud security posture management

Dynatrace strengthens cloud security posture management

Veriti Cloud automates remediation across both on-premises and cloud environments

Veriti Cloud automates remediation across both on-premises and cloud environments

Atrinet URL Scanner helps comabat SMS phishing

Atrinet URL Scanner helps comabat SMS phishing

OpenNHP: Cryptography-driven zero trust protocol

OpenNHP: Cryptography-driven zero trust protocol

The API security crisis and why businesses are at risk

The API security crisis and why businesses are at risk

International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

International Civil Aviation Organization (ICAO) and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists

Online food ordering and delivery platform GrubHub discloses a data breach

Online food ordering and delivery platform GrubHub discloses a data breach

Netgear urges users to upgrade two flaws impacting WiFi router models

Netgear urges users to upgrade two flaws impacting WiFi router models

AMD fixed a flaw that allowed to load malicious microcode

AMD fixed a flaw that allowed to load malicious microcode

Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites

Coyote Banking Trojan targets Brazilian users, stealing data from 70+ financial apps and websites