California Attorney General Rob Bonta announced a proposed $12.75 million settlement agreement with General Motors (GM) over ...
A security researcher has released a proof-of-concept tool named GhostLock that demonstrates how a legitimate Windows file API can be abused in attacks to block access to files stored locally or on ...
Education technology giant Instructure has confirmed that a security vulnerability allowed hackers to modify Canvas login ...
This upcoming webinar explores how organizations need to combine security, backups, and recovery planning to reduce the ...
Resetting a password doesn't always remove attackers from Active Directory. Specops Software explains how cached credentials ...
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web ...
Attackers are abusing Google Ads and legitimate Claude.ai shared chats in an active malvertising campaign. Users searching ...
German authorities have shut down a relaunch version of the criminal marketplace 'Crimenetwork' that generated more than 3.6 ...
The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows ...
Attackers move faster than overwhelmed SOC teams can realistically investigate alerts. Prophet Security breaks down how AI ...
A malicious Hugging Face repository that reached the platform's trending list impersonated OpenAI's "Privacy Filter" project ...
A new Linux zero-day exploit, named Dirty Frag, allows local attackers to gain root privileges on most major Linux ...