CISA adds 8 exploited vulnerabilities to KEV, sets April 23 and May 4, 2026 deadlines, driving urgent federal patching.
In 2022, the National Center for Missing and Exploited Children received more than 80,000 reports of online enticement of children, including more than 10,000 reports of financial ...
A 40-year-old police officer was arrested April 16, 2026, on charges of promoting and possessing child sexual exploitation images. Michael S. Patterson, of Colonie, was charged with Promoting a Sexual ...
Medical tech giant Stryker said it’s in the process of restoring its computers and internal network following a cyberattack that reportedly allowed pro-Iranian hackers to remotely wipe tens of ...
U.S. investigators believe hackers affiliated with the Chinese government are responsible for a cyber intrusion on an internal Federal Bureau of Investigation computer network that holds information ...
Google Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities actively exploited throughout 2025, almost half of them in enterprise software and appliances. The figure is a 15% increase ...
Researchers warn that a newly identified open-source AI security testing platform called CyberStrikeAI was used by the same threat actor behind a recent campaign that breached hundreds of Fortinet ...
Forbes contributors publish independent expert analyses and insights. Javier Bastardo is a Venezuelan covering Bitcoin news since 2017. On February 11 the most concrete action Bitcoin developers have ...
Federal investigators charged the alleged leaders of an online grooming network operating on Discord, outlining how authorities uncovered the group and brought those involved to court. Study of 27.8M ...
APPOMATTOX COUNTY, Va. (WSET) — A new donation is helping investigations into online child exploitation. The Appomattox County Sheriff’s Office just got a new computer designed to help fight crimes ...
The day when quantum computers will be able to break conventional encryption is rapidly approaching, but not all companies are prepared to implement post-quantum cryptography. Quantum-safe encryption ...