We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits
Published 1 hour ago
-
TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
Published 1 hour ago
-
China Upgrades the Backdoor It Uses to Spy on Telcos Globally
Published 2 hours ago
-
Wartime Usage of Compromised IP Cameras Highlight Their Danger
Published 4 hours ago
-
Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks
Published 4 hours ago
-
AitM Phishing Targets TikTok Business Accounts Using Cloudflare Turnstile Evasion
Published 6 hours ago
-
Google Sets 2029 Deadline for Quantum-Safe Cryptography
Published 7 hours ago
-
We Are At War
Published 7 hours ago
-
Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
Published 8 hours ago
-
LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Published 10 hours ago
-
Infrastructure Attacks With Physical Consequences Down 25%
Published 22 hours ago
-
Coruna, DarkSword & Democratizing Nation-State Exploit Kits
Published 22 hours ago
-
Is the FCC's Router Ban the Wrong Fix?
Published 23 hours ago
-
Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles
Published 23 hours ago
-
Critical Flaw in Langflow AI Platform Under Attack
Published 23 hours ago
-
China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks
Published 1 day ago
-
How Organizations Can Use Blunders to Level Up Their Security Programs
Published 1 day ago
-
AI-Powered Dependency Decisions Introduce, Ignore Security Bugs
Published 1 day ago
-
Claude Extension Flaw Enabled Zero-Click XSS Prompt Injection via Any Website
Published 1 day ago
-
Intermediaries Driving Global Spyware Market Expansion
Published 1 day ago
-
Masters of Imitation: How Hackers and Art Forgers Perfect the Art of Deception
Published 1 day ago
-
ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
Published 1 day ago
-
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
Published 1 day ago
-
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
Published 1 day ago
-
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Published 1 day ago