News

A new malware named LameHug is using Alibaba's large language models (LLM), the very same tech that powers AI chatbots like ...
One of the world's largest digital design platforms, Thingiverse, is taking new steps to block 3D-printed guns and gun parts ...
A report about Chinese staff working on US systems under supervision of American ‘digital escorts’ has prompted a review of ...
CrushFTP is warning that threat actors are actively exploiting a zero-day vulnerability tracked as CVE-2025-54309, which ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Matanbuchus 3.0 malware loader evolves with advanced stealth techniques, targeting companies via social engineering tactics.
Threats to IT businesses from North Korean impersonators and highly complex phishing attacks are just two of the more recent ...
The Pentagon bans foreign citizens from accessing highly sensitive data, but Microsoft bypasses this by using engineers in ...
Microsoft is using potentially unqualified supervisors for engineers in China who are helping maintain the Department of ...
Google refused to share any details on how its Big Sleep AI foiled efforts to exploit a SQLite vulnerability in the wild.
North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new ...
Cloudflare has published its quarterly DDoS threat report for Q2 2025 and the company says it has blocked millions of attacks ...