Restoration of Ukraine’s State Registers After Major Cyber-Attack
Ukraine's state registers have been fully restored following a significant cyber-attack attributed to Russia, ensuring data security and operational integrity....
Ukraine's state registers have been fully restored following a significant cyber-attack attributed to Russia, ensuring data security and operational integrity....
A former CIA analyst has admitted to sharing top secret documents on social media, raising serious national security concerns. A...
In response to significant cyber intrusions, the US has imposed sanctions on Chinese state cyber actors involved in breaches of...
The DONOT APT group from India is exploiting a malicious Android application disguised as a chat platform for intelligence gathering....
On June 24, we observed a new campaign distributing a stealer targeting Mac users via malicious Google ads for the...
Competition between stealers for macOS is heating up, with a new malvertising campaign luring Mac users via a fraudulent advert...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
GoDaddy's multiple data breaches reveal critical security shortcomings, prompting an FTC investigation that mandates significant improvements in their security practices....
The EU is taking significant steps to improve healthcare cybersecurity with the launch of a new Cybersecurity Support Centre by...
In an era where email security is paramount, cybercriminals are leveraging innovative techniques such as image-based malware and GenAI to...
In a proactive move, President Joe Biden has strengthened the software supply chain security requirements just before the transition of...
A new hacking group has exposed the configuration files of 15,000 Fortinet firewalls, raising serious security concerns. A new threat...
Middle Eastern real estate fraud is surging as scammers exploit online listings, taking advantage of potential buyers' trust and urgency....
Compliance with DORA is leading UK and EU businesses to face costs exceeding €1 million, prompting concerns within the financial...
Rampant scams on Truth Social threaten users, highlighting the urgent need for vigilance against cybercriminal activities. Truth Social, the social...
The Digital Operational Resilience Act (DORA) brings significant compliance challenges for financial firms navigating new regulations in the EU. The...
In the ever-evolving world of cybersecurity, the Lazarus Group has emerged as a significant threat, specifically targeting developers to gain...
Noyb, a leading European digital rights organization, has initiated GDPR complaints against TikTok and five notable Chinese tech companies, alleging...
The recent ruling from the US Supreme Court has pushed TikTok closer to a potential ban in the U.S., unless...
In a surprising turn, the Russian cyber espionage group Star Blizzard has initiated a targeted campaign aimed at compromising WhatsApp...
Secureworks Counter Threat Unit (CTU) has unveiled troubling links between North Korean interests and fraudulent crowdfunding campaigns, emphasizing the evolving...
In its first Patch Tuesday of 2025, Microsoft addressed eight critical zero-day vulnerabilities, including three actively exploited flaws that require...
Fortinet has identified a critical zero-day vulnerability affecting its FortiGate firewalls, designated CVE-2024-55591, with a CVSS score of 9.6. This...
In a significant global law enforcement effort, the PlugX malware used by state-backed Chinese hackers has been successfully removed from...