We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
Published 4 hours ago
-
New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
Published 5 hours ago
-
How Ceros Gives Security Teams Visibility and Control in Claude Code
Published 7 hours ago
-
DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover
Published 9 hours ago
-
EU Sanctions Companies in China, Iran for Cyberattacks
Published 11 hours ago
-
CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
Published 12 hours ago
-
DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike
Published 21 hours ago
-
C2 Implant 'SnappyClient' Targets Crypto Wallets
Published 22 hours ago
-
OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
Published 1 day ago
-
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
Published 1 day ago
-
'Claudy Day’ Trio of Flaws Exposes Claude Users to Data Theft
Published 1 day ago
-
SideWinder Espionage Campaign Expands Across Southeast Asia
Published 1 day ago
-
Meta, TikTok Steal Users' Sensitive PII When They Click on Ads
Published 1 day ago
-
Claude Code Security and Magecart: Getting the Threat Model Right
Published 1 day ago
-
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
Published 1 day ago
-
Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels
Published 1 day ago
-
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
Published 1 day ago
-
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
Published 1 day ago
-
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23
Published 1 day ago
-
More Attackers Are Logging In, Not Breaking In
Published 1 day ago
-
Clear Communication: The Missing Link in Cybersecurity Success
Published 1 day ago
-
Less Lucrative Ransomware Market Makes Attackers Alter Methods
Published 1 day ago
-
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
Published 1 day ago
-
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Published 2 days ago
-
Warlock Ransomware Group Augments Post-Exploitation Activities
Published 2 days ago