Security

Critical VMware ESXi Flaw Lets Hackers Escape Virtual Machines and Deploy Ransomware

Critical VMware ESXi Flaw Lets Hackers Escape Virtual M...

Ransomware groups are actively exploiting a critical VMware ESXi sandbox escape ...

Hikvision Warns of High-Severity Vulnerability in Wireless Access Points, Users Urged to Update Firmware

Hikvision Warns of High-Severity Vulnerability in Wirel...

Hikvision has fixed a high-severity security flaw affecting multiple wireless ac...

Fake File Conversion Tools Distribute Malicious File Converter Apps and Backdoor Malware

Fake File Conversion Tools Distribute Malicious File Co...

Fake file converter apps promoted through malicious Google ads are infecting use...

Notepad++ Supply Chain Attack Exposes Risks in Software Update Security

Notepad++ Supply Chain Attack Exposes Risks in Software...

Notepad++ confirms a supply chain cyberattack where malicious updates were deliv...

Microsoft Edge Security Issues Raise Cyber Threat Concerns, CERT-In Advises Immediate Update

Microsoft Edge Security Issues Raise Cyber Threat Conce...

CERT-In has warned of high-severity security vulnerabilities in Microsoft Edge t...

Malicious Chrome Extensions Bypass Google Review Process, Enabling Phishing and Browser Hijacking Attacks

Malicious Chrome Extensions Bypass Google Review Proces...

A new malware-as-a-service called Stanley is spreading malicious Chrome extensio...

Redmi Buds Found Vulnerable to Bluetooth Attacks, Exposing Users to Data Leaks and Device Disruptions

Redmi Buds Found Vulnerable to Bluetooth Attacks, Expos...

Security researchers have discovered critical Bluetooth vulnerabilities in Xiaom...

Google Calendar Vulnerability Lets Hackers Exploit Gemini AI to Leak Private Meeting Data

Google Calendar Vulnerability Lets Hackers Exploit Gemi...

A Google Gemini vulnerability allowed hackers to exploit Google Calendar using A...

Grubhub Cyber Attack Highlights Growing Threat of Data Breaches and Credential Theft

Grubhub Cyber Attack Highlights Growing Threat of Data ...

Grubhub confirms a data breach after hackers accessed internal systems, triggeri...

Microsoft Cracks Down on RedVDS Platform Linked to Widespread Online Fraud and Email Scams

Microsoft Cracks Down on RedVDS Platform Linked to Wide...

Microsoft disrupted the RedVDS cybercrime platform linked to large-scale phishin...

Cyber Resilience in the AI Era: Why Preparedness, Recovery Planning, and Human Expertise Matter More Than Ever in Modern Cybersecurity

Cyber Resilience in the AI Era: Why Preparedness, Recov...

Modern cyberattacks are becoming faster and more complex with AI and automation....

High-Severity Hikvision Vulnerabilities Allowing Local Network Attacks on Surveillance Devices, Urges Immediate Firmware Updates for Affected Systems

High-Severity Hikvision Vulnerabilities Allowing Local ...

Hikvision has disclosed two high-severity vulnerabilities that allow local netwo...

European Space Agency Data Breach Claims Spotlight Rising Cyber Threats in Space Technology Sector

European Space Agency Data Breach Claims Spotlight Risi...

A suspected cyberattack involving European space systems highlights growing cybe...

Google Issues Urgent Chrome Security Update to Fix High-Severity WebView Vulnerability

Google Issues Urgent Chrome Security Update to Fix High...

Google has released an urgent Chrome security update to fix the high-severity CV...

Growing Cyber Risks Show Why Real-Time Detection Is Critical for Data Protection

Growing Cyber Risks Show Why Real-Time Detection Is Cri...

Cyber threats are evolving rapidly with AI-driven attacks, advanced phishing, ra...

CISA KEV List Update Shows Sharp Increase in Actively Exploited Vulnerabilities

CISA KEV List Update Shows Sharp Increase in Actively E...

The Known Exploited Vulnerabilities (KEV) list is maintained by CISA to track so...