Explore Infosecurity Magazine’s most-read cybersecurity stories of 2025, from major vendor shake-ups and zero-day exploits to AI-driven threats and supply chain attacks ...
An ethical hacker successfully deleted three white supremacist websites in front of an elated crowd – all while dressed as a ...
I studied computer science at University College Dublin, where the four-year course covered a broad range of topics. We ...
The latest incarnation of the notorious BreachForums hacking forum has suffered a data breach, with its user database table ...
An IT security researcher reveals how a wheelchair's QR code becomes a master key to all comfort functions.
What happens when you combine an Arduino-based microcontroller with a palm-sized aluminum box and clicky buttons? A fidget ...
The Zeroday Cloud hacking competition in London has awarded researchers $320,000 for demonstrating critical remote code execution vulnerabilities in components used in cloud infrastructure. The first ...
NordVPN, which has a 17% VPN market share in the U.S., has issued a security update following claims of a hack attack and ...
Security firm Proofpoint has discovered that hackers have found a clever way to bypass multi-factor authentication (MFA) and thereby get their hands on accounts belonging to corporate users. In a ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
Microsoft 365 is under attack, China and Russia afflited hackers suspected. Updated December 23 with advice from a mobile security solutions expert regarding the Russian device code attacks targeting ...