All posts tagged "cybersecurity"
-
Security
/ 2 days agoLotus Wiper Malware Targets Venezuelan Energy Sector
cybersecurity researchers have identified a previously undocumented data wiper malware used in attacks against Venezuela in late 2025 and early 2026....
-
Artificial Intelligence
/ 3 days agoUnauthorized Group Breaches Anthropic’s Exclusive Cyber Tool Mythos
Anthropic, the artificial intelligence company behind the Claude chatbot, is investigating claims that an unauthorized group has gained access to its...
-
Security
/ 3 days agoMature Security Teams Reduce Threat Response Time
security operations centers in mature organizations are significantly reducing the time it takes to neutralize cyber threats, according to industry analysis....
-
Security
/ 3 days agoRansomware Negotiator Pleads Guilty in BlackCat Attacks
A Florida man has pleaded guilty to federal charges for his role in assisting the notorious BlackCat ransomware gang in extorting...
-
Security
/ 3 days ago22 Flaws Expose Thousands of Serial-to-IP Converters
cybersecurity researchers have identified 22 new security vulnerabilities in widely used serial-to-IP converter devices from manufacturers Lantronix and Silex. The flaws,...
-
Security
/ 3 days agoSystemBC C2 Server Exposes 1,570+ Ransomware Victims
Security researchers have uncovered a command and control server linked to a known proxy malware, revealing a botnet of more than...
-
Security
/ 3 days agoCISA Adds 8 Exploited Flaws to Catalog, Sets Federal Deadlines
The U.S. cybersecurity and Infrastructure Security Agency (CISA) updated its public catalog of security vulnerabilities on Monday, adding eight new entries...
-
Security
/ 3 days agoGoogle Patches Antigravity IDE Vulnerability Enabling Code Execution
Google has addressed a security vulnerability in its Antigravity integrated development environment, or IDE, that could have allowed attackers to execute...
-
Security
/ 3 days agoAndroid Malware Trojanizes HandyPay App to Steal NFC Data
cybersecurity researchers have identified a new campaign targeting Android users in Brazil, where a known malware family has been modified to...
-
Security
/ 3 days agoIdentity Attacks Overtake Exploits as Top Breach Method
Security researchers report a significant shift in cyberattack strategies, with identity-based attacks now surpassing software exploits as the most common initial...

