News

News

Presenting AI to the Board as a CISO? Here’s a Template.

As organizations accelerate the adoption of generative AI, boards of directors and AI committees are asking new question...
News

CommetJacking attack tricks Comet browser into stealing emails

A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions ...
News

Oracle links Clop extortion attacks to July 2025 vulnerabilities

Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabil...
News

Gmail business users can now send encrypted emails to anyone

Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or ...
News

Microsoft Outlook stops displaying inline SVG images used in attacks

Microsoft says Outlook for Web and the new Outlook for Windows will no longer display risky inline SVG images that are b...
News

DrayTek warns of remote code execution bug in Vigor routers

Networking hardware maker DrayTek released an advisory to warn about a security vulnerability in several Vigor router mo...
News

HackerOne paid $81 million in bug bounties over the past year

Bug bounty platform HackerOne has paid $81 million in rewards to white-hat hackers worldwide over the past 12 months. Ha...
News

Your Service Desk is the New Attack Vector—Here’s How to Defend It.

The service desk is the new perimeter Attackers aren’t picking locks—they’re picking people. The fastest way inside many...
News

Microsoft Defender bug triggers erroneous BIOS update alerts

​Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices' BIOS (Basic In...
News

Android spyware campaigns impersonate Signal and ToTok messengers

Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for t...