APPLICATIONS
You can add some category description here.
-
Apple, T-Mobile and Google face billions in civil penalties over TikTok
Tony Tan is an Alphabet stockholder, which makes him more than a little concerned that the company’s Google subsidiary might…
Read More » -
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle…
Read More » -
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
Jul 04, 2025The Hacker NewsAI Security / Enterprise Security Generative AI is changing how businesses work, learn, and innovate. But…
Read More » -
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux…
Read More » -
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
Jul 04, 2025Ravie LakshmananMobile Security / Privacy Google has been ordered by a court in the U.S. state of California…
Read More » -
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
Jul 03, 2025Ravie LakshmananBrowser Security / Cryptocurrency Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that…
Read More » -
The Hidden Weaknesses in AI SOC Tools that No One Talks About
If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under…
Read More » -
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability The French cybersecurity agency on Tuesday revealed that a number of entities spanning…
Read More » -
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Jul 03, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates to address a maximum-severity security flaw in Unified…
Read More » -
North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the…
Read More »