资讯

Australia is facing a troubling uptick in data breaches, with the country recording its highest number of reported incidents this decade. According to the Office of the Australian Information ...
Texas Attorney General Ken Paxton has reached a $1.375 billion settlement with tech giant Google, marking the largest amount ever recovered by a single state in a data privacy lawsuit. This historic ...
The Nmap Project has officially launched the highly anticipated Nmap 7.96, bringing a wealth of new features, performance upgrades, and bug fixes to the popular network scanning tool. As a fundamental ...
U.S. legislation to criminalize non-consensual intimate images, videos and deepfakes has passed Congress with the overwhelming support of both parties, and even social media companies have voiced ...
Google’s Threat Intelligence Group (GTIG) released its annual analysis of zero-day exploitation, detailing how 2024 saw attackers increasingly target enterprise software and infrastructure over ...
In a joint advisory, the United Kingdom’s National Cyber Security Centre (NCSC), along with international partners from five countries, has revealed details about two spyware variants — BADBAZAAR and ...
What started as an innocent trend—turning selfies into adorable “Studio Ghibli-style AI images”—has now taken a sinister turn. AI-powered tools, once celebrated for artistic creativity, are now being ...
Morse Corp Inc., a Massachusetts-based defense contractor, has agreed to pay $4.6 million to resolve allegations of cybersecurity fraud under the False Claims Act. The U.S. Department of Justice ...
The dawn of AI and advanced technological tools has rendered previous security measures vulnerable to high-level cyberattacks. However, cybersecurity specialists have successfully provided ...
CVE-2025-27364, a critical Remote Code Execution (RCE) flaw has been discovered in MITRE Caldera, an open-source adversary emulation platform used by security professionals. This flaw could allow ...
Cyble Research and Intelligence Labs (CRIL) has uncovered a stealthy campaign that uses malicious LNK files disguised as seemingly innocent wallpapers to deliver AsyncRAT—an infamous remote access ...
Over the past four years, the Cybersecurity and Infrastructure Security Agency (CISA) has emerged as a vital force in shaping the nation’s cybersecurity landscape. Established to safeguard critical ...