News

Apple has introduced Memory Integrity Enforcement (MIE), a system-wide security feature designed to crush one of the most persistent threats to iPhone users—that of Spyware. The company describes MIE ...
Chess.com, one of the world’s largest online platforms for playing chess, has disclosed a data breach affecting 4,541 people, including residents of Maine and Vermont. The company confirmed that an ...
The UAE Cyber Security Council (CSC) has issued a stark warning that 70 per cent of smart home devices are vulnerable to cyberattacks if not properly secured. The council emphasized that the growing ...
Czechia’s national cybersecurity watchdog has issued a warning about foreign cyber operations, focussed on Chinese data transfers and remote administration, urging both government bodies and private ...
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
The word “hacking” often brings up images of hooded figures in dark rooms, tapping away at keyboards to steal our identities and drain our bank accounts. But the truth is, hacking is a much broader ...
Tails is a free, privacy-focused operating system that runs entirely from a USB drive, leaving no trace on the computer it’s used on. By routing all traffic through Tor and preloading with security ...
Google’s Threat Intelligence Group has uncovered a cyber espionage campaign of a PRC-linked threat actor, which it tracks as UNC6384, using captive portals ...
The U.S. Cybersecurity and Information Security Agency (CISA) has added two Citrix vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog just as new Citrix vulnerabilities emerge – one ...
Agid reports a major cyberattack on Italian hotels with 100K ID scans stolen and sold on the dark web, exposing guests to serious identity theft risks.
Buffalo Police detective indicted for buying stolen data from illicit online marketplace Genesis Market. Faces ID theft and fraud charges. FBI investigating.
An INTERPOL-coordinated operation, dubbed Operation Serengeti 2.0, delivered a telling blow to cybercrime across the African continent. The operation that ran between June and August, this year, saw 1 ...