News

A new proof-of-concept (PoC) cyberattack uses subtle language over multiple prompts to manipulate major large language models (LLMs) into generating inappropriate content. That's according to research ...
Citrix has fixed a critical vulnerability, tracked as CVE-2025-5777, found within NetScaler ADC and NetScaler Gateway. The vulnerability, assigned a critical CVSS score of 9.3, is described as an ...
AWS RE:INFORCE 2025 — Philadelphia — This week at its re:Inforce 2025 conference, Amazon Web Services unveiled a range of security enhancements to AWS Security Hub, AWS Shield and Amazon GuardDuty to ...
When Israeli hackers deleted data from Iran's state-owned Bank Sepah, disrupting financial services, the act represented another escalation of the use of cyberattacks during geopolitical conflicts, ...
Modern enterprise software development increasingly relies on a vast and complex supply chain of third-party components, integrations, and frameworks. No-code development platforms are no exception, ...
Cybercriminals continue to sneak malicious repositories onto GitHub. Typosquatting, dependency confusion, and other types of cyberattacks precipitated through malicious packages are old and common ...
At least two journalists had their iOS devices compromised in recent months as a result of commercial spyware, according to research published this past week. The Citizen Lab, a research laboratory at ...
As they trade missile strikes, Iran and Israel have also faced heavy waves of cyberattacks this past week. On June 13, Israel initiated a military offensive it called "Operation Rising Lion," aimed at ...
Financially troubled Indian car-sharing firm Zoomcar Holdings suffered a data breach last week, after "an unauthorized third ...
The stigma surrounding burnout among security staffers may be fading, but organizations need to continue expanding the conversations about managing a fast-moving list of stressors. From CISOs to new ...
Earlier this week, OpenAI launched OpenAI for Government, which will provide AI technology for US public servants. The tech giant's existing collaborations with the US National Labs, the Air Force ...
Attackers are increasingly employing advanced tactics to evade anti-beaconing defenses, and enterprise security teams are constantly updating their methods to detect beaconing attacks before the ...