Security

Google Calendar Vulnerability Lets Hackers Exploit Gemini AI to Leak Private Meeting Data

Google Calendar Vulnerability Lets Hackers Exploit Gemi...

A Google Gemini vulnerability allowed hackers to exploit Google Calendar using A...

Grubhub Cyber Attack Highlights Growing Threat of Data Breaches and Credential Theft

Grubhub Cyber Attack Highlights Growing Threat of Data ...

Grubhub confirms a data breach after hackers accessed internal systems, triggeri...

Microsoft Cracks Down on RedVDS Platform Linked to Widespread Online Fraud and Email Scams

Microsoft Cracks Down on RedVDS Platform Linked to Wide...

Microsoft disrupted the RedVDS cybercrime platform linked to large-scale phishin...

Cyber Resilience in the AI Era: Why Preparedness, Recovery Planning, and Human Expertise Matter More Than Ever in Modern Cybersecurity

Cyber Resilience in the AI Era: Why Preparedness, Recov...

Modern cyberattacks are becoming faster and more complex with AI and automation....

High-Severity Hikvision Vulnerabilities Allowing Local Network Attacks on Surveillance Devices, Urges Immediate Firmware Updates for Affected Systems

High-Severity Hikvision Vulnerabilities Allowing Local ...

Hikvision has disclosed two high-severity vulnerabilities that allow local netwo...

European Space Agency Data Breach Claims Spotlight Rising Cyber Threats in Space Technology Sector

European Space Agency Data Breach Claims Spotlight Risi...

A suspected cyberattack involving European space systems highlights growing cybe...

Google Issues Urgent Chrome Security Update to Fix High-Severity WebView Vulnerability

Google Issues Urgent Chrome Security Update to Fix High...

Google has released an urgent Chrome security update to fix the high-severity CV...

Growing Cyber Risks Show Why Real-Time Detection Is Critical for Data Protection

Growing Cyber Risks Show Why Real-Time Detection Is Cri...

Cyber threats are evolving rapidly with AI-driven attacks, advanced phishing, ra...

CISA KEV List Update Shows Sharp Increase in Actively Exploited Vulnerabilities

CISA KEV List Update Shows Sharp Increase in Actively E...

The Known Exploited Vulnerabilities (KEV) list is maintained by CISA to track so...

Inter-State Crime Gang Used Google Maps for Digital Surveillance, Case Highlights Tech Misuse

Inter-State Crime Gang Used Google Maps for Digital Sur...

Jharkhand Police arrested an inter-state crime gang that misused Google Maps for...

Cyber Threats Intensify in India as Report Highlights Security Gaps Across Key Sectors

Cyber Threats Intensify in India as Report Highlights S...

As per the India Cyber Threat Report 2026 published by Seqrite, India witnessed ...

Ransomware Attack Triggers Widespread Patient Data Exposure in Healthcare Sector

Ransomware Attack Triggers Widespread Patient Data Expo...

A large healthcare ransomware attack exposed sensitive patient data of nearly 50...

Why Every Business Must Strengthen Cybersecurity to Prevent Data Breaches

Why Every Business Must Strengthen Cybersecurity to Pre...

Small and medium businesses face rising cyberattacks as hackers target weak secu...

Beware of New Year Scam Messages: Fake Greetings and APK Files Fuel Cyber Fraud

Beware of New Year Scam Messages: Fake Greetings and AP...

Cyber scams surge during the festive season as fraudsters use fake greeting link...

India’s Digital Security Push: CNAP and SIM-Binding to Reduce Scam Calls and Online Fraud

India’s Digital Security Push: CNAP and SIM-Binding to ...

India plans new telecom security rules like CNAP and SIM-binding to combat cyber...

Why Multi Factor Authentication Is Essential to Prevent Data Breaches and Unauthorized Access

Why Multi Factor Authentication Is Essential to Prevent...

Multi factor authentication protects accounts from ransomware, phishing, and dat...