The CVE Program has launched two new working groups, the CVE Consumer Working Group (CWG) and CVE Researcher Working Group…
Read More »cybersecurity threats
Scattered Spider, a group of young hackers, has surged in cyberattacks on critical industries using social engineering to exploit corporate…
Read More »A pro-Russia disinformation campaign is using freely available AI tools to spread fabricated content online, targeting elections, immigration, and the…
Read More »Critical cybersecurity vulnerabilities in Linux SOHO devices (LapDogs), WinRAR (CVE-2025-6218), and Notepad++ (CVE-2025-49144) demand urgent patching to prevent unauthorized access…
Read More »Cyber threats are shifting toward stolen credentials and built-in system tools, requiring proactive security measures as traditional perimeter defenses become…
Read More »ICE's use of facial recognition via the Mobile Fortify app on smartphones raises privacy and civil liberties concerns, with critics…
Read More »ClickFix attacks, exploiting human psychology through deceptive error messages, surged by 517% in 2025, becoming the second most prevalent cyber…
Read More »Online scams are increasingly sophisticated, prompting Trend Micro's Scam Radar to offer real-time protection by identifying emerging threats before damage…
Read More »Quantum computing has advanced to crack small RSA keys (22-bit), signaling future threats to global encryption standards, though current 2048-bit…
Read More »Quantum computing advancements pose an imminent threat to traditional encryption, requiring immediate action to protect sensitive data from emerging risks.…
Read More »