Jun 06, 2025The Hacker NewsArtificial Intelligence / Zero Trust When generative AI tools became widely available in...
Jun 06, 2025The Hacker NewsCybercrime / Financial Fraud India’s Central Bureau of Investigation (CBI) has revealed that...
Jun 06, 2025The Hacker NewsCyber Resilience / Penetration Testing Cybersecurity involves both playing the good guy and...
A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper,...
Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian...
Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its Internet space come under Russian...
Jun 05, 2025Ravie LakshmananBrowser Security / Online Safety Cybersecurity researchers have flagged several popular Google Chrome extensions...
Jun 05, 2025Ravie LakshmananThreat Intelligence / Network Security The threat actor known as Bitter has been assessed...
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve...
Jun 05, 2025Ravie LakshmananMalware / Cyber Espionage An Iran-aligned hacking group has been attributed to a new...