MPs Dangerously Uninformed About Facial Recognition – Report
Most British lawmakers are unaware or misinformed about how and where facial recognition technology (FRT) is being used, and the...
Most British lawmakers are unaware or misinformed about how and where facial recognition technology (FRT) is being used, and the...
Two giants of the banking and legal sectors have been breached by suspected ransomware actors, according to reports.Allen & Overy...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Cybersecurity researchers have discovered a stealthy backdoor named Effluence that's deployed following the successful exploitation of a recently disclosed security...
The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power outage...
Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as a target of...
There is a seemingly never-ending quest to find the right security tools that offer the right capabilities for your organization....
A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to propagate...
A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including Israel, in October...
OpenAI has been addressing "periodic outages" due to DDoS attacks targeting its API and ChatGPT services within the last 24...
A threat actor has been abusing Google Ads to distribute a trojanized version of the CPU-Z tool to deliver the...
Kyocera AVX Components Corporation (KAVX) is sending notices of a data breach exposing personal information of 39,111 individuals following a...
Image: Adrian Grycuk/CC BY-SA 3.0 PL The Industrial & Commercial Bank of China (ICBC) is restoring systems and services following...
Threat actors are exploiting a zero-day vulnerability in the service management software SysAid to gain access to corporate servers for data theft and...
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw in SysAid IT...
Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting...
While intended for convenience and efficient communication, email auto-forwarding rules can inadvertently lead to the unauthorized dissemination of sensitive information...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol (SLP)...
Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called "Protect IP Address in Calls"...
The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote...
Microsoft has recently removed from its store a fraudulent Ledger Live app for cryptocurrency management after multiple users lost at...
Shared service provider TransForm has published an update on the cyberattack that recently impacted operations in multiple hospitals in Ontario,...