On February 24, 2026, we published an article about how a fake Zoom meeting “update” silently installs monitoring software, documenting a campaign that used a convincing fake Zoom waiting room to push ...
Cristie Software introduces kernel-level application-based file system protection for advanced data security. Cristie Software announces FSBlocker, a kernel-level driver for application-based access ...
Guidance on securing cloud workloads across multi-cloud environments with continuous vulnerability management, agentless scanning, build-to-runtime security, and automated compliance.
Vitalik Buterin proposes Ethereum overhaul targeting state tree & virtual machine bottlenecks, advancing zero-knowledge scalability.
A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted ...
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or ...