UN Adopts Controversial Cybercrime Treaty
United Nations member states have adopted the Convention Against Cybercrime, ending almost three years of negotiations.However, many stakeholders, including NGOs...
United Nations member states have adopted the Convention Against Cybercrime, ending almost three years of negotiations.However, many stakeholders, including NGOs...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to...
The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could...
After a good year of sustained exuberance, the hangover is finally here. It's a gentle one (for now), as the...
Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and...
The Russian government and IT organizations are the target of a new campaign that delivers a number of backdoors and...
Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be abused to gain root...
Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Multiple vulnerabilities were identified in ChromeOS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Cybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository that masquerades as a library...
As many as 10 security flaws have been uncovered in Google's Quick Share data transfer utility for Android and Windows...
An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed...
Cybersecurity researchers have uncovered weaknesses in Sonos smart speakers that could be exploited by malicious actors to clandestinely eavesdrop on...
Microsoft has disclosed an unpatched zero-day in Office that, if successfully exploited, could result in unauthorized disclosure of sensitive information...
In early July 2024, some of the world’s leading AI companies joined forces to create the Coalition for Secure AI...
One of the US Cybersecurity and Infrastructure Security Agency's (CISA) flagship initiatives is Secure by Design, launched in 2023. Now, the...
Data exfiltration is critical in double extortion cyber-attacks, which have become the new gold standard of ransomware attacks.In a new report,...
OpenAI has a tool to automatically watermark AI-generated content, but company leadership is split on whether to release it to...
Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in...
Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote...