Google patches two actively exploited Chrome vulnerabilities that could allow attackers to crash browsers or run malicious code. Billions of users urged to update.
Stryker said Thursday that it’s in the midst of responding to a “global network disruption to our Microsoft environment as a ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since 2025, Storm-2561 mimics trusted brands and abuses legitimate services. This ...
Free antivirus apps can protect your PC from common threats—but paid software often adds stronger defenses, extra tools, and peace of mind. I'm here to walk you through the differences.
Strategic partnership brings NowSecure data directly into the iVerify Enterprise admin portal. BELFAST, NORTHERN ...
ESET researchers have traced the reactivation of Sednit’s advanced implant team to a 2024 case in Ukraine, where a keylogger named SlimAgent was deployed.During that operation, BeardShell, a second Se ...
Attacks exploiting zero-day vulnerabilities in enterprise technology reached record levels in 2025. Cyber espionage groups ...
Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.
This week, Cisco patches and hacks. Trojanized app targeted Israelis. Bye-bye, Tycoon 2FA. Also bye-bye LeakBase. A ...
Exploitation of zero-days by commercial surveillance and spyware developers outpaced exploitation by nation-state actors last year, according to a report.
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances.
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks.