US Defense Contractor Boss Sold Zero Days to Russia — Cops a Plea
Peter Williams admits to selling unpatched iPhone bugs to a shady Russian broker.The former head of L3Harris’s Trenchant “offensive cyber”...
Peter Williams admits to selling unpatched iPhone bugs to a shady Russian broker.The former head of L3Harris’s Trenchant “offensive cyber”...
For decades, the Local Area Network (LAN) has been the neglected, insecure backyard of the enterprise. While we’ve poured...
Summary Oracle has begun targeting universities for audits to enforce its employee-based Java licensing model. Those found non-compliant face...
Veeam Software plans to expand the scope of its offerings into the realm of data security posture management (DSPM)...
For decades, federal programs operating in high-security or classified domains have relied on air-gapped environments as a primary line...
Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10...
Oct 30, 2025Ravie LakshmananMalware / Cybercrime The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing...
Oct 30, 2025Ravie LakshmananBrowser Security / Vulnerability A severe vulnerability disclosed in Chromium's Blink rendering engine can be exploited to...
In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex...
Ransomware remains one of today’s most disruptive cyber threats, but it is far from the only one. Attackers are also...
We are in the middle of an AI gold rush. The technology is advancing, democratizing access to everything from...
As engineering teams race to adopt the Model Context Protocol (MCP) to harness the power of agentic AI, a...
Bring Your Own Device (BYOD) programs are now a fixture of the modern workplace. Employees expect to use their...
Threat researchers with cybersecurity firm Silent Push are linking bad actors with heavy ties to the Russian underworld to...
The rapid increase in data breaches has prompted businesses to strengthen their identity and access management (IAM) strategies through...
Subscribe To InfoSec Today News