Security
Critical VMware ESXi Flaw Lets Hackers Escape Virtual M...
Ransomware groups are actively exploiting a critical VMware ESXi sandbox escape ...
Hikvision Warns of High-Severity Vulnerability in Wirel...
Hikvision has fixed a high-severity security flaw affecting multiple wireless ac...
Fake File Conversion Tools Distribute Malicious File Co...
Fake file converter apps promoted through malicious Google ads are infecting use...
Notepad++ Supply Chain Attack Exposes Risks in Software...
Notepad++ confirms a supply chain cyberattack where malicious updates were deliv...
Microsoft Edge Security Issues Raise Cyber Threat Conce...
CERT-In has warned of high-severity security vulnerabilities in Microsoft Edge t...
Malicious Chrome Extensions Bypass Google Review Proces...
A new malware-as-a-service called Stanley is spreading malicious Chrome extensio...
Redmi Buds Found Vulnerable to Bluetooth Attacks, Expos...
Security researchers have discovered critical Bluetooth vulnerabilities in Xiaom...
Google Calendar Vulnerability Lets Hackers Exploit Gemi...
A Google Gemini vulnerability allowed hackers to exploit Google Calendar using A...
Grubhub Cyber Attack Highlights Growing Threat of Data ...
Grubhub confirms a data breach after hackers accessed internal systems, triggeri...
Microsoft Cracks Down on RedVDS Platform Linked to Wide...
Microsoft disrupted the RedVDS cybercrime platform linked to large-scale phishin...
Cyber Resilience in the AI Era: Why Preparedness, Recov...
Modern cyberattacks are becoming faster and more complex with AI and automation....
High-Severity Hikvision Vulnerabilities Allowing Local ...
Hikvision has disclosed two high-severity vulnerabilities that allow local netwo...
European Space Agency Data Breach Claims Spotlight Risi...
A suspected cyberattack involving European space systems highlights growing cybe...
Google Issues Urgent Chrome Security Update to Fix High...
Google has released an urgent Chrome security update to fix the high-severity CV...
Growing Cyber Risks Show Why Real-Time Detection Is Cri...
Cyber threats are evolving rapidly with AI-driven attacks, advanced phishing, ra...
CISA KEV List Update Shows Sharp Increase in Actively E...
The Known Exploited Vulnerabilities (KEV) list is maintained by CISA to track so...