Crypto.com Launches a $2 Million Bug Bounty Program to Strengthen Security
Crypto.com has initiated a groundbreaking $2 million bug bounty program aimed at enhancing its cybersecurity efforts and engaging with ethical...
Crypto.com has initiated a groundbreaking $2 million bug bounty program aimed at enhancing its cybersecurity efforts and engaging with ethical...
In a significant development, Russia has arrested a prominent ransomware operator known for his online activities. This move highlights the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
Cyber-attacks are reportedly jeopardizing the fairness of Romania's live presidential elections, according to recent warnings from national security officials. Romania’s...
A recent cyber-attack has brought alarming news for Alder Hey Children's NHS Foundation Trust, as the notorious ransomware group, INC...
Cybercrime victims in the UK are facing significant setbacks in the justice system, as highlighted by a recent report from...
A recently identified malicious package on the Python Package Index (PyPI), known as 'aiocpa', threatens the security of cryptocurrency wallets....
A new cyber-attack leveraging the GodLoader technique has infected thousands using the Godot Gaming Engine. Learn how this undetectable malware...
Recent findings reveal critical vulnerabilities in the Advantech EKI-6333AC-2G industrial wireless access point, with significant security risks for users in...
T-Mobile's robust cybersecurity measures successfully thwarted the Salt Typhoon hacking group, ensuring sensitive customer data remained secure. A notorious Chinese...
European authorities have managed to disrupt a major Albanian drug smuggling operation by successfully decrypting the communications used by the...
A critical vulnerability has been exploited in public-facing instances of ProjectSend, a popular open-source file-sharing application. According to VulnCheck, a...
Multiple vulnerabilities were identified in F5 Products, attacker can exploit this vulnerability to trigger denial of service condition and data manipulation...
The Nuclear Decommissioning Authority (NDA) has established a cutting-edge cybersecurity hub to enhance defense strategies across the nuclear supply chain....
Operation Serengeti has made significant strides in combatting cybercrime across Africa, arresting over 1,000 suspects linked to $193 million in...
Cybersecurity researchers have unveiled Bootkitty, a pioneering UEFI bootkit aimed at Linux systems, highlighting a crucial shift in cyber threats....
APT-C-60 has launched a sophisticated cyber attack, targeting Japan and other East Asian organizations using phishing tactics. A cyber-attack targeting...
Pro-Russian hacktivists have unveiled a ransomware-as-a-service (RaaS) operation to further their agenda, highlighting the convergence of hacktivism and cybercrime. A...
The EU Commission's primary focus will be on enhancing healthcare cybersecurity in its initial days under Ursula von der Leyen's...
The Russian-aligned RomCom Advanced Persistent Threat (APT) group has recently been reported to exploit critical zero-day vulnerabilities in Firefox and...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
Over a third of organizations are encountering significant hurdles in monitoring unsanctioned AI tools, according to recent findings from Strategy...
In the past year, UK consumers have faced an alarming rise in online fraud, with scam losses increasing by 50%...
A new DDoS campaign leveraging IoT devices and misconfigured servers has emerged, revealing alarming cybersecurity vulnerabilities. A recent investigation by...