
Evolved PXA Stealer wraps PureRAT in multi-layer obfuscation
Security researchers have uncovered a Vietnamese threat group evolving from their custom PXA Stealer campaign into […]

Vulnerability in Salesforce AI could be tricked into leaking CRM data
A newly disclosed critical vulnerability in Salesforce’s Agentforce platform could trick the AI agent into leaking […]

AI coding assistants amplify deeper cybersecurity risks
The productivity improvements that arise from increasing use of AI coding tools are coming at the […]
Government’s Push for Data Privacy in 2025
Privacy of data is not a compliance option anymore, it is a national priority. Governments around […]

Die besten Cyber-Recovery-Lösungen
Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität […]

Chinese spies had year-long access to US tech and legal firms
Chinese threat actors deployed a custom Linux backdoor on compromised network edge devices to maintain persistent […]
Microsoft AI CEO on the Danger of Considering AI Conscious: ‘There is Nothing Inside’
One of the recurring themes in conversations about generative AI is its ability to mimic human […]
Alibaba’s ‘Most Powerful’ AI Model: Qwen3-Max Packs 1 Trillion Parameters
Alibaba has released its most powerful AI model yet, the Qwen3-Max, a system with more than […]

Macs go phishing as GitHub impostors drop Atomic stealer
In an active, large-scale campaign, attackers are posing as legitimate brands on GitHub Pages to target […]

What I learned extending zero trust to the storage layer
When I first started thinking seriously about applying zero trust principles to the storage layer, it […]