54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known...
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known...
IO River this week revealed it is leveraging the portable WebAssembly (Wasm) binary instruction format to make it possible...
Tenable Research revealed “LeakyLooker,” a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have...
Image: cait00sith/Envato An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance operations to...
IRONSCALES today revealed it has developed three artificial intelligence (AI) agents for its email security platform, including one that...
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to build Kimwolf, the...
Ravie LakshmananFeb 27, 2026Network Security / Vulnerability The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain...
Ravie LakshmananFeb 17, 2026Enterprise Security / Artificial Intelligence New research from Microsoft has revealed that legitimate businesses are gaming artificial...
Ravie LakshmananFeb 09, 2026Vulnerability / Endpoint Security Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat...
Ravie LakshmananFeb 06, 2026Artificial Intelligence / Vulnerability Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM),...
Ravie LakshmananFeb 02, 2026Threat Intelligence / Malware The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update...
A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment has created...
A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and...
Ravie LakshmananJan 28, 2026Vulnerability / Threat Intelligence Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially...
Image: Freepik Security researchers have revealed a flaw in Google’s Gemini AI assistant that allowed attackers to quietly pull private...