News

Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
A vulnerability in Google's Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers' computers using allowlisted programs.
If you’ve ever stumbled upon the mysterious file named $rw8t1ct.exe on your computer, you’re probably wondering, “What is this thing and why should I be ...
Hackers are actively exploiting a critical SharePoint zero-day vulnerability to compromise dozens of servers and steal ...
Even at the free tier, Hide.me's automated connection is some of the best we’ve seen. Users can set rules when connected to Wi-Fi whether it’s secured or unsecured, and Ethernet, including automatic ...