Tech Article
High-severity vulnerability in Passwordstate credential manager. Patch now.
Vulnerability can be exploited to gain access to customers' crown jewels. ...
Explore our latest articles about security
Showing 12 of 74 articles (Page 6 of 7)
Tech Article
Vulnerability can be exploited to gain access to customers' crown jewels. ...
Tech Article
Breaches in 2020 and 2025, reportedly by foreign adversaries, exposed confidential files. ...
Tech Article
Exploits allow for persistent backdooring when targets open booby-trapped archive. ...
Tech Article
An encryption algorithm can have weaknesses that could allow an attacker to listen in. ...
Tech Article
Running JavaScript from inside an image? What could possibly go wrong? ...
Tech Article
Disclosure comes two months after Google warned the world of ongoing spree. ...
Tech Article
Why AI-based voice cloning is the next frontier social-engineering attacks. ...
Tech Article
Stopping people from falling for phishing attacks isn't working. So what are organizations to do? ...
Tech Article
The allegations are the latest to accuse Perplexity of improper web crawling. ...
Tech Article
End goal is the installation of a malicious TLS root certificate for use in intel gathering. ...
Tech Article
Also, a cybersecurity firm analyzes the smart TV in question. ...
Tech Article
Sophisticated group also used novel means to disguise their custom malware. ...