Reality Defender Wins RSAC Innovation Sandbox Competition
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for…
In a field thick with cybersecurity startups showing off how they use AI and LLMs, Reality Defender stood out for…
Google has released a security update for the Chrome browser to fix the fifth zero-day vulnerability exploited in the wild…
Security flaws in Telit Cinterion cellular modems, widely used in sectors including industrial, healthcare, and telecommunications, could allow remote attackers…
Poland says a state-backed threat group linked to Russia's military intelligence service (GRU) has been targeting Polish government institutions throughout…
Researchers recently spotted the Spanish-speaking threat actor — with nearly 400 previous victims under its belt — in a new…
Citrix notified customers this week to manually mitigate a PuTTY SSH client vulnerability that could allow attackers to steal a XenCenter admin's private…
Diving into a new sophisticated campaign, exploiting Microsoft’s Open Redirect vulnerability through quishing By Elad Damari, Incident Response Group Manager,…
An attacker accessed personal information of over 225,000 active, reserve, and former UK military members from third-party payroll processing system.
PRESS RELEASE Mountain View, Calif. – May 8th, 2024 – Cyolo, the secure remote access company for...
F5 has fixed two high-severity BIG-IP Next Central Manager vulnerabilities, which can be exploited to gain admin control and create…