Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB)…

‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

The Identities Behind AI Agents: A Deep Dive Into AI & NHI

AI agents have rapidly evolved from experimental technology to essential…

ZITADEL IDOR Vulnerabilities Let Attackers Modify Sensitive Settings

A critical Insecure Direct Object Reference (IDOR) vulnerability chain in…

46 New Vulnerabilities in Solar Inverters Systems Let Attackers Tamper Inverter Settings

Researchers have uncovered critical security flaws in global solar power…

PoC Exploit Released for Yelp Flaw that Exposes SSH Keys on Ubuntu Systems

A proof-of-concept (PoC) exploit has been released for CVE-2025-3155, a…

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

Cybersecurity researchers have detailed four different vulnerabilities in a core…