The European Union has officially had enough of state-adjacent hackers treating its member states…
device
-
-
A suspected wiper attack against medtech giant Stryker has led much of the security…
-
Jan 06, 2026Ravie LakshmananIoT Security / Vulnerability The CERT Coordination Center (CERT/CC) has disclosed…
-
Application SecuritySecurity
Hackers exploit Microsoft OAuth device codes to hijack enterprise accounts
The tactic represents an evolution of techniques that financially motivated groups used earlier this…
-
Multiple threat groups have been ramping up attacks using a technique called device code…
-
“This tactical adaptation enables the same operational outcomes, credential harvesting, and lateral movement into…
-
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting…
-
A new Android malware locks device screens and demands that users pay a ransom…
-
Cisco is announcing a security initiative that will push customers to update or replace…
-
Have you ever misplaced your phone and wished you could just “ping” it like…
