We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
Published 56 minutes ago
-
New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption
Published 3 hours ago
-
18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE
Published 4 hours ago
-
Checkbox Assessments Aren't Fit to Measure to Risk
Published 13 hours ago
-
Attackers Weaponize RubyGems for Data Dead Drops
Published 13 hours ago
-
Tables Turn on 'The Gentlemen' RaaS Gang With Data Leak
Published 13 hours ago
-
Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape
Published 15 hours ago
-
Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday
Published 20 hours ago
-
LatAm Vibe Hackers Generate Custom Hacking Tools on the Fly
Published 21 hours ago
-
China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm
Published 21 hours ago
-
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation
Published 21 hours ago
-
[Webinar] Why Your AppSec Tools Miss the "Lethal Path" (and How to Fix It)
Published 22 hours ago
-
Most Remediation Programs Never Confirm the Fix Actually Worked
Published 22 hours ago
-
Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws
Published 23 hours ago
-
GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data
Published 1 day ago
-
Android Adds Intrusion Logging for Sophisticated Spyware Forensics
Published 1 day ago
-
It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
Published 1 day ago
-
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
Published 1 day ago
-
RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
Published 1 day ago
-
Hugging Face Packages Weaponized With a Single File Tweak
Published 1 day ago
-
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
Published 1 day ago
-
Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
Published 1 day ago
-
Worm Redux: Fresh Mini Shai-Hulud Infections Bite Supply Chain
Published 1 day ago
-
Why Agentic AI Is Security's Next Blind Spot
Published 1 day ago
-
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
Published 2 days ago