Ivanti has disclosed two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and ...
Two vulnerabilities in n8n’s sandbox mechanism could be exploited for remote code execution (RCE) on the host system.
A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK ...
The 2026 Microsoft Data Security Index explores one of the most pressing questions facing organizations today: How can we ...
Hackers have abused the Hugging Face infrastructure to host a malicious payload and infect Android users with a remote access trojan.
Semiconductor fabs form the backbone of the global technology supply chain. But as these facilities take on the role of critical infrastructure, they’re turning into prime targe ...
With the achievements that last year brought about at the local, regional and global levels, the beginning of this new year ...
Security teams often spend days manually turning long incident reports and threat writeups into actionable detections by ...
Google seizes domains used by the IPIDEA proxy network, which sold access to devices compromised through free VPNs, proxy services, and mobile apps.