Pwn2Own Auto Offers $500K for Tesla Hacks
There will be four major categories in the 2025 retread of the hacking competition, with prizes ranging for each challenge,…
Third Ivanti Bug Comes Under Active Exploit, CISA Warns
Though the critical vulnerability was patched in August, Ivanti is reminding customers to update as soon as possible as attacks…
Timeshare Owner? The Mexican Drug Cartels Want You
The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel…
Sophisticated RAT Hides Behind P. Diddy Scandal Lures
The advanced Python-based PysSilon malware can steal data, record keystrokes, and execute remote commands. The attackers behind it are promising…
How Russia, China & Iran Are Targeting US Elections
While these threats remain a valid concern, US government agencies have doubled down on their assurances to the American public…
Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%
Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led…
US May Be Losing the Race for Global AI Leadership
To maintain AI leadership, Congress and regulatory agencies must recognize that our foreign competitors are working to surpass us. To…
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto…