
New research reveals AirSnitch attacks that exploit low-level network behaviors to bypass client isolation, a core security feature…

A cyberattack claimed by an Iranian-aligned group has disrupted Stryker’s Microsoft environment, raising concerns about retaliatory hacks following…

Eclypsium researchers reveal nine vulnerabilities in IP KVMs from four manufacturers, allowing unauthenticated root access and code execution,…

Internal government reports from 2024 reveal cybersecurity evaluators called Microsoft’s GCC High cloud a ‘pile of shit’ due…

A trade group for cloud service providers has lodged an antitrust complaint with the European Commission, targeting Broadcom’s…

A supply chain attack has compromised nearly all versions of Aqua Security’s Trivy scanner, forcing malicious updates that…

Google has revised its internal deadline for quantum computing threats to 2029, pushing for industry-wide adoption of post-quantum…

Russia’s GRU-linked APT28 has compromised up to 40,000 consumer routers, using them to redirect traffic and harvest credentials…