Adobe Data Breach Allegedly Exposes 13 Million Support Tickets
A threat actor known as “Mr. Raccoon” claims to have breached Adobe, stealing a massive amount of sensitive data.
20 articles
A threat actor known as “Mr. Raccoon” claims to have breached Adobe, stealing a massive amount of sensitive data.
Here’s a look at the most interesting products from the past month, featuring releases from Beazley, Bonfy.AI, Mend.
Updates have been issued by Google to fix 21 vulnerabilities in its Chrome browser, including the actively exploited high-severity zero-day flaw, tracked as ...
Suspected Iran-linked hacktivist operation Nasir Security, also known as Nasir Resistance, has commenced exposing data allegedly pilfered following a months-...
Major Japanese multinational automaker Nissan has confirmed having its data compromised in a cyberattack against a third-party vendor earlier this year after...
Cisco had over three million Salesforce records with personal information, AWS buckets, GitHub repositories, and other corporate information allegedly stolen...
BleepingComputer reports that organizations around the world, particularly in the U.S.
Cloud storage buyers rarely get vendor-provided performance data that includes the vendor’s own weak spots. Backblaze’s Q1 2026 Performance Stats report, att...
Hasbro suffers a cyberattack, disrupting some operations; the company is probing the scope and potential data compromise. Toy giant Hasbro reported a cyberat...
A recent Gartner report, "Validate the Promises of AI SOC Agents With These Key Questions," provides a structured evaluation framework.
Last week, there were disclosed in and that have been added to the Wordfence Intelligence Vulnerability Database, and there were that contributed to WordPres...
OpenSSH 10.3 shipped carrying five security fixes alongside feature additions and a set of behavior changes that will break compatibility with older SSH impl...
Red Hat has announced Red Hat Enterprise Linux Extended Life Cycle Premium, a new subscription that provides a predictable 14-year life cycle for major Red H...
The explosion of AI-bot traffic, representing over 10 billion requests per week, has opened up new challenges and opportunities for cache design. We look at ...
In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open source...
Apple has extended security updates to a wider range of devices still running iOS 18, aiming to protect users from the DarkSword exploit kit. This is not the...
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with...
The European Commission has confirmed a cyberattack affecting its Europa.eu web platform, with initial reports indicating that the attackers accessed the dat...
Apple on Wednesday expanded the availability of iOS 18.7.
In this second part of a two-part series, we explore Linux rootkit detection engineering, focusing on the limitations of static detection reliance, and the i...