We are B9 and we are here to make sure YOU are not B-10. We are B9 and we are here to make sure YOU are not B-10.
-
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Published 1 hour ago
-
Prepping for 'Q-Day': Why Quantum Risk Management Should Start Now
Published 3 hours ago
-
Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests
Published 4 hours ago
-
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
Published 6 hours ago
-
April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
Published 6 hours ago
-
Microsoft, Salesforce Patch AI Agent Data Leak Flaws
Published 6 hours ago
-
Deterministic + Agentic AI: The Architecture Exposure Validation Requires
Published 7 hours ago
-
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Published 10 hours ago
-
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Published 14 hours ago
-
Microsoft Bets $10 Billion to Boost Japan's AI, Cybersecurity
Published 18 hours ago
-
Privilege Elevation Dominates Massive Microsoft Patch Update
Published 21 hours ago
-
EDR-Killer Ecosystem Expansion Requires Stronger BYOVD Defenses
Published 22 hours ago
-
Wargame Exercise Demonstrates How Social Media Manipulation Works
Published 1 day ago
-
New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
Published 1 day ago
-
AI-Driven Pushpaganda Scam Exploits Google Discover to Spread Scareware and Ad Fraud
Published 1 day ago
-
Google Adds Rust-Based DNS Parser into Pixel 10 Modem to Enhance Security
Published 1 day ago
-
Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
Published 1 day ago
-
Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)
Published 1 day ago
-
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
Published 1 day ago
-
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers
Published 1 day ago
-
CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software
Published 1 day ago
-
Why Orgs Need to Test Networks to Withstand DDoS Attacks During Peak Loads
Published 1 day ago
-
CSA: CISOs Should Prepare for Post-Mythos Exploit Storm
Published 1 day ago
-
Adobe Patches Actively Exploited Zero-Day That Lingered for Months
Published 1 day ago
-
Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
Published 1 day ago