In 2023 we saw the emergence of the first criminally focused generative AI models, with WormGPT grabbing headlines for its ability to assist hackers in creating malicious software. WolfGPT and ...
Chinese hackers are burrowing into the networks of major critical U.S. infrastructure, including energy grids, water ...
Before the end of its first full day of operations, the new Trump administration gutted all advisory panels for the Department of Homeland Security. Among these was the well-respected Cyber Safety ...
SOCs and other centralized services are one of the most effective ways that states can raise the overall cybersecurity posture, says Fallon. “State-managed services relieve some of the burdens on ...
Subaru patched the vulnerability within 24 hours but left broader privacy concerns unresolved.
Crypto hacks surge in 2025, targeting exchanges, DeFi platforms, and users with global efforts intensify to counter North Korean-linked threats.
Penetration testing team Sam Curry and Shubham Shah discovered a vulnerability in Starlink’s administrator console, which allowed hackers to compromise the accounts of Subaru employees and gain admin ...
Two security researchers discovered a security vulnerability in Subaru’s Starlink connected vehicles last year that gave them “unrestricted targeted access to all vehicles and customer accounts” ...
One of the latest significant information leaks involves data from PowerSchool, a software provider for thousands of K–12 school districts in the United States and Canada. The incident affected ...
As reported by Cybernews, the cybersecurity company Check Point details the most impersonated brands in phishing schemes from Q4 of 2024 – and to no one’s surprise, Microsoft continues to top the list ...
A year ago, two security researchers discovered vulnerabilities in a Subaru web portal that allowed them to hijack car controls and track driver location data, according to a Wired report.
CISA and the FBI warned today that attackers are still exploiting Ivanti Cloud Service Appliances (CSA) security flaws ...