A convincing impersonation of TidBITS contributor Glenn Fleishman on our public Slack group fooled an experienced IT professional into installing the OSX.Odyssey infostealer. Because Slack is designed ...
A researcher known as "Chaotic Eclipse" has published a proof-of-concept exploit for a second Microsoft Defender zero-day, ...
RedSun exploit targets Microsoft Defender zero-day, granting SYSTEM access on fully patched Windows systems with no patch ...
SAP has released 19 new security notes on its April 2026 security patch day, including one that resolves a critical-severity ...
The Payouts King ransomware is using the QEMU emulator as a reverse SSH backdoor to run hidden virtual machines on ...
This overlooked Windows feature reveals more than you’d expect.
The China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to ...
Premium Brands (PBH:CA) hits the $80–$90 buy range after pullback. Management is shifting toward equity-funded acquisitions ...
JanelaRAT hits Latin American banks with 14,739 attacks in Brazil in 2025, enabling credential theft and financial espionage ...
The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign that has targeted ...
After Anthropic unveiled its Claude Mythos AI model, OpenAI introduced its own cybersecurity-focused model, GPT-5.4-Cyber.
In a new book, Quinn Slobodian and Ben Tarnoff argue that Elon Musk’s disruptive approach to business is transforming both ...