Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT ...
Dell RecoverPoint zero-day CVE-2026-22769 exploited since 2024 to gain root access and deploy GRIMBOLT, BRICKSTORM backdoors in targeted attacks.
Plus, AI-powered phishing campaigns represented over 80% of social engineering events in 2025. The post Report: 1 in 4 Data ...
New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities ...
Microsoft patches 59 vulnerabilities, including six actively exploited zero-days, with CISA mandating urgent federal remediation.
These 4 critical AI vulnerabilities are being exploited faster than defenders can respond ...
Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimbra in an attempt to remotely execute malicious commands that install a backdoor, researchers warn. The ...
Staff data belonging to the regulator and judiciary's governing body accessed The Dutch Data Protection Authority (AP) says ...
Forbes contributors publish independent expert analyses and insights. Lars Daniel covers digital evidence and forensics in life and law. Update Now—Apple releases critical updates to in response to ...
The US National Institute of Standards and Technology (NIST) has launched a new metric to assess the likelihood that a vulnerability is being exploited. In a technical white paper, published on May 19 ...
Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs Your email has been sent Volt Typhoon, a Chinese state-sponsored hacking group, has been caught ...