The Government of India’s Department of Pension & Pensioners’ Welfare (DoPPW) has launched the Digital Life Certificate (DLC) Campaign 4.0, a national drive to make pension services more accessible ...
The Attorneys General of California, Connecticut, and New York have announced a $5.1 million settlement with Illuminate Education, Inc., an educational technology company, for failing to adequately ...
Cyble has detailed 22 vulnerabilities under attack by threat actors and ransomware groups, and today brought news of another risky vulnerability.
Qilin remained the top ransomware group in August, but two rapidly emerging competitors are threatening to shake up the threat landscape. Those are some of the conclusions from Cyble’s monthly ...
APT28, the long-running actor tracked as Fancy Bear, Sofacy and Sednit, used a compact but technically sophisticated campaign that researchers documented as Phantom Net Voxel. The campaign is an ...
More than 20 CrowdStrike NPM packages were among nearly 200 NPM packages hit by a sophisticated supply chain attack. The compromised packages were quickly removed and CrowdStrike said its Falcon ...
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
Tails is a free, privacy-focused operating system that runs entirely from a USB drive, leaving no trace on the computer it’s used on. By routing all traffic through Tor and preloading with security ...
Buffalo Police detective indicted for buying stolen data from illicit online marketplace Genesis Market. Faces ID theft and fraud charges. FBI investigating.
Agid reports a major cyberattack on Italian hotels with 100K ID scans stolen and sold on the dark web, exposing guests to serious identity theft risks.
CVE‑2025‑9132, an out-of-bounds write in Chrome’s V8 engine, risks remote code execution. Users must update to Chrome 139.0.7258.138/.139 promptly.
CISA flags active exploits in N-able N-central: CVE-2025-8875 (deserialization) and CVE-2025-8876 (command injection).
Some results have been hidden because they may be inaccessible to you
Show inaccessible results