Cybersecurity

Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators

Jan 07, 2026The Hacker NewsThreat Detection / Endpoint Security Security teams are still catching malware. The problem is what they're not catching. More attacks today don't arrive as files. They don't...
spot_img

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity...

Weekly Update 484

I think the start of this week's video really nailed it for the techies amongst us: shit doesn't work, you change something random and...

Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations

Each year, several security solution providers – including Sophos – sign up for MITRE’s ATT&CK Enterprise Evaluations, a full-scale cyber attack emulation covering one...

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

Dec 29, 2026Ravie LakshmananDatabase Security / Vulnerability A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000...

I am not a robot: ClickFix used to deploy StealC and Qilin

ClickFix is an increasingly common tactic used by threat actors to install malicious software on victims’ devices. It has gone through a number of...

Industrial threat report for Q3 2025

Statistics across all threats In Q3 2025, the percentage of ICS computers on which malicious objects were blocked decreased from the previous quarter by 0.4...
spot_img