Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes, enabling...
Cisco has issued a critical security advisory warning of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that...
A new wave of highly targeted cyberattacks is putting hospitals, local governments, and even defense-linked operators at risk leveraging deception, advanced malware,...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
A new wave of cyberattacks, dubbed "Sidewinder," is targeting critical maritime infrastructure worldwide, disrupting operations and posing significant risks to global supply chains. The...
A critical remote code execution (RCE) vulnerability has been discovered in ServiceNow, a widely-used IT service management platform. Threat actors are actively exploiting this...
In a proactive move to bolster the nation's digital defenses, Malaysia's Digital Minister, Gobind Singh Deo, has announced plans to establish a dedicated data...
A critical vulnerability in VMware’s ESXi hypervisor has been exploited by multiple ransomware groups to gain unrestricted administrative access to victim systems. This alarming...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning to organizations worldwide, adding three critical vulnerabilities to its Known Exploited Vulnerabilities...
The United States Department of Justice (DOJ) has escalated its legal battle against TikTok, urging a federal appeals court to uphold a law mandating...
In a significant move to bolster the cybersecurity of India's critical infrastructure, the National Power Training Institute (NPTI) and the Indian Institute of Technology...
In a significant counteroffensive against cybercrime, French authorities have initiated a "disinfection operation" aimed at removing the notorious PlugX malware from infected systems across...
A sophisticated phishing attack targeting India Post users has been uncovered, with strong indications pointing towards a Chinese state-sponsored hacking group. The campaign, leveraging...
In a shocking development that sent ripples through the cryptocurrency community, WazirX, a prominent Indian cryptocurrency exchange, has unveiled its recovery plan following a...
In a bold and brazen attack, a sophisticated cybercrime group has launched a large-scale assault targeting multiple Russian banks. The attack, which commenced on...
The ConfusedFunction vulnerability in Google Cloud Platform (GCP) highlighted a critical security issue arising from misconfigurations in the Cloud Build service. While Google has...
In a significant victory against online exploitation, Meta, the parent company of Instagram, has announced the removal of over 63,000 accounts linked to Nigerian...
In a recent discovery that underscores the complexities of cloud security, researchers have uncovered a critical privilege escalation vulnerability within Google Cloud Platform (GCP)....
In a significant development in the global fight against cybercrime, the U.S. Department of Justice (DoJ) has indicted a North Korean hacker for orchestrating...
The cyber threat landscape is constantly evolving, with adversaries adapting their strategies to maximize their impact. Recent findings indicate a shift in tactics by...
In a significant data breach incident, BMW has confirmed that the personal data of approximately 14,000 Hong Kong customers was compromised. The unauthorized access...
The recent CrowdStrike outage, which impacted millions of Windows devices worldwide, has underscored the limitations of cyber insurance policies in covering massive losses stemming...
On July 19th, 2024, a significant IT outage impacted millions of Windows devices worldwide, with CrowdStrike, a leading endpoint protection platform, taking responsibility for...