Cisco was reported to have had its source code stolen by threat actors following an attack linked...
data-security
Proton Meet utilizes the Messaging Layer Security (MLS) protocol for end-to-end encryption, ensuring that all media and...
The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an...
The AI model, which has seen significant improvements since its beta phase, can now detect 14 times...
The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when...
The analysis, using MobSF, focused on app permissions, third-party trackers, hardcoded network endpoints, and developer emails.
Dating app OkCupid and its parent company Match Group Americas have reached a settlement with the Federal...
Healthcare software firm CareCloud has disclosed the potential compromise of individuals' health records following the eight-hour breach...
Leading U.S. global security, defense, and aerospace contractor Lockheed Martin has 375 TB of data purportedly stolen...
Researchers at Check Point discovered that a single malicious prompt could exploit a hidden outbound channel within...