News

Your weekly strategic brief on the cyber threat landscape. Uncover the deeper patterns behind attacks, from bootkit malware ...
From bogus résumés to fake IDs, North Korean and Chinese hackers are using AI chatbots to infiltrate companies and carry out ...
Hackers use Microsoft Teams screen control requests to hijack devices and steal millions in crypto, warns security expert.
Two billion downloads per week. That’s the download totals for the NPM packages compromised in a supply-chain attack this ...
JavaScript packages with billions of downloads were compromised by an unknown threat actor looking to steal cryptocurrency.
If you’re on the security side of things, you can arm your Raspberry Pi with Kali Linux and go ham on pen-testing and ethical ...