Security researchers have uncovered a technique that allows attackers to abuse Cortex XDR’s Live Response feature as a covert command-and-control (C2) channel - effectively turning...
On 28 January 2026, Abu Dhabi will host one of the most discreet yet strategically significant cybersecurity gatherings of the year. The Cyber Envoy’s...
In a year where cybercriminals increasingly weaponized artificial intelligence to launch more convincing scams and stealthier malware, Google has dramatically scaled its...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
The headless CMS architecture, with its decoupled front and back ends, offers unprecedented flexibility and scalability. However, this architectural shift introduces new security challenges....
In a significant move to bolster its cybersecurity defenses, Japan is considering legislation that would mandate private sector organizations to report cyber incidents to...
Google has swiftly addressed a high-severity vulnerability in the Android kernel that was actively exploited in targeted attacks. The flaw, identified as CVE-2024-36971, poses...
Ritesh Bhatia is a seasoned Cybercrime Investigator and Cybersecurity and Data Privacy Consultant with over 20 years of expertise in the field of cyberspace....
A recent study conducted by cybersecurity researchers has exposed critical vulnerabilities in Windows Smart App Control (SAC) and SmartScreen, two key security features designed...
A newly discovered Android spyware, dubbed LianSpy, has emerged as a significant threat to mobile users, demonstrating a sophisticated evasion technique by utilizing Yandex...
In a stark reminder of the escalating cyber threat landscape, Keytronic, a prominent technology manufacturer, has disclosed a significant financial loss of $15 million...
A newly discovered Android trojan, dubbed "BlackBot," is posing a significant threat to Turkish users, specifically targeting financial data. This malicious software has been...
In a significant development with far-reaching implications, Singapore's Ministry of Education (MOE) has ordered the removal of the Mobile Guardian app from all students'...
With over 26 years of experience in industry and academia, Sunil is an expert in Cloud, Blockchain, Database Technologies, and Soft Computing. A TEDx...
The cybersecurity landscape is evolving rapidly, with threats becoming increasingly sophisticated and complex. Security operations centers (SOCs) are under immense pressure to detect and...
A recent study by cybersecurity researchers has shed light on the evolving tactics of the ransomware gang UNC4393, formerly reliant on the Qakbot botnet...
India is facing an unprecedented surge in cyberattacks, with a staggering 593 incidents reported in the first half of 2024 alone. The alarming figures...
In a startling revelation, cybersecurity researchers have uncovered a new variant of the notorious Mandrake spyware masquerading as legitimate apps on the Google Play...
A new wave of cyberattacks, dubbed "Sidewinder," is targeting critical maritime infrastructure worldwide, disrupting operations and posing significant risks to global supply chains. The...
A critical remote code execution (RCE) vulnerability has been discovered in ServiceNow, a widely-used IT service management platform. Threat actors are actively exploiting this...
In a proactive move to bolster the nation's digital defenses, Malaysia's Digital Minister, Gobind Singh Deo, has announced plans to establish a dedicated data...
A critical vulnerability in VMware’s ESXi hypervisor has been exploited by multiple ransomware groups to gain unrestricted administrative access to victim systems. This alarming...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning to organizations worldwide, adding three critical vulnerabilities to its Known Exploited Vulnerabilities...