Artificial intelligence is rapidly becoming a personal assistant for learning, productivity, creativity, and decision-making. But who gets access to powerful AI - and at...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
American Express (Amex) recently issued a security alert notifying cardholders of a data breach that potentially exposed their information through a third-party service provider....
Ransomware attacks, where malicious actors encrypt a victim's data and demand a ransom for its decryption, have become a major concern for individuals and...
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued three critical advisories highlighting vulnerabilities in widely used Industrial Control Systems (ICS) components.
These vulnerabilities,...
In a concerning development, a recent cyberattack severely disrupted the operations of Change Healthcare, the largest healthcare payment system in the United States. This...
Cybersecurity concerns are heightened as the notorious cybercrime groups GhostSec and Stormous join forces to launch double-extortion ransomware attacks across over 15 countries.
This collaboration...
Apple has released security patches to address critical zero-day vulnerabilities impacting various iPhone, iPad, and Mac models.
These vulnerabilities, actively exploited in the wild,...
VMware, a leading provider of virtualization software, recently released security patches to address critical vulnerabilities affecting its popular products, ESXi, Workstation, and Fusion.
These...
In a significant move, the United States Department of Justice (DOJ) has taken down the infrastructure behind Predator, a powerful spyware tool used to...
The recent news that hackers behind the February 2024 attack on Change Healthcare, a major healthcare IT provider, allegedly received a $22 million ransom...
In a landmark agreement, the UAE Cyber Security Council and the International Telecommunication Union (ITU) have joined forces to enhance global cybersecurity capacity. This...
The Cybersecurity and Infrastructure Security Agency (CISA) recently added a single new entry to its Known Exploited Vulnerabilities (KEV) Catalog, raising concerns about the...
Cybersecurity researchers have identified a concerning tactic employed by the cybercriminal group TA577, highlighting a potential vulnerability within the NTLM (NT LAN Manager) authentication...
The world of artificial intelligence (AI) is not immune to cyber threats. Researchers have recently discovered a novel and concerning attack method: a self-propagating...
News of a major data breach at Chunghwa Telecom, Taiwan's largest telecommunications provider, has sent shockwaves across the nation.
Suspected Chinese hackers are believed to...
The Middle East is setting the pace for email security with a surprising surge in the adoption of Domain-based Message Authentication, Reporting & Conformance...
German law enforcement continues to disrupt online criminal marketplaces with the recent takedown of "Crimemarket,” a platform facilitating the trade of drugs, weapons, and...
European consumer groups have reignited the debate surrounding online privacy with a recent complaint against Meta, the company behind Facebook, Instagram, and WhatsApp.
The...
In a proactive move to bolster cybersecurity in the United Arab Emirates (UAE), the UAE Cybersecurity Council has launched the "National Campaign for Cybersecurity."...
A recent cyberattack by the notorious Lazarus Group targeting Windows systems has raised serious concerns about a previously unknown vulnerability.
This article explores the...
Attention developers using JetBrains TeamCity On-Premises! A recent discovery of critical security vulnerabilities poses a significant risk of server takeover by malicious actors.
This...