Security

Fake File Conversion Tools Distribute Malicious File Converter Apps and Backdoor Malware

Fake File Conversion Tools Distribute Malicious File Co...

Fake file converter apps promoted through malicious Google ads are infecting use...

Notepad++ Supply Chain Attack Exposes Risks in Software Update Security

Notepad++ Supply Chain Attack Exposes Risks in Software...

Notepad++ confirms a supply chain cyberattack where malicious updates were deliv...

Microsoft Edge Security Issues Raise Cyber Threat Concerns, CERT-In Advises Immediate Update

Microsoft Edge Security Issues Raise Cyber Threat Conce...

CERT-In has warned of high-severity security vulnerabilities in Microsoft Edge t...

Malicious Chrome Extensions Bypass Google Review Process, Enabling Phishing and Browser Hijacking Attacks

Malicious Chrome Extensions Bypass Google Review Proces...

A new malware-as-a-service called Stanley is spreading malicious Chrome extensio...

Redmi Buds Found Vulnerable to Bluetooth Attacks, Exposing Users to Data Leaks and Device Disruptions

Redmi Buds Found Vulnerable to Bluetooth Attacks, Expos...

Security researchers have discovered critical Bluetooth vulnerabilities in Xiaom...

Google Calendar Vulnerability Lets Hackers Exploit Gemini AI to Leak Private Meeting Data

Google Calendar Vulnerability Lets Hackers Exploit Gemi...

A Google Gemini vulnerability allowed hackers to exploit Google Calendar using A...

Grubhub Cyber Attack Highlights Growing Threat of Data Breaches and Credential Theft

Grubhub Cyber Attack Highlights Growing Threat of Data ...

Grubhub confirms a data breach after hackers accessed internal systems, triggeri...

Microsoft Cracks Down on RedVDS Platform Linked to Widespread Online Fraud and Email Scams

Microsoft Cracks Down on RedVDS Platform Linked to Wide...

Microsoft disrupted the RedVDS cybercrime platform linked to large-scale phishin...

Cyber Resilience in the AI Era: Why Preparedness, Recovery Planning, and Human Expertise Matter More Than Ever in Modern Cybersecurity

Cyber Resilience in the AI Era: Why Preparedness, Recov...

Modern cyberattacks are becoming faster and more complex with AI and automation....

High-Severity Hikvision Vulnerabilities Allowing Local Network Attacks on Surveillance Devices, Urges Immediate Firmware Updates for Affected Systems

High-Severity Hikvision Vulnerabilities Allowing Local ...

Hikvision has disclosed two high-severity vulnerabilities that allow local netwo...

European Space Agency Data Breach Claims Spotlight Rising Cyber Threats in Space Technology Sector

European Space Agency Data Breach Claims Spotlight Risi...

A suspected cyberattack involving European space systems highlights growing cybe...

Google Issues Urgent Chrome Security Update to Fix High-Severity WebView Vulnerability

Google Issues Urgent Chrome Security Update to Fix High...

Google has released an urgent Chrome security update to fix the high-severity CV...

Growing Cyber Risks Show Why Real-Time Detection Is Critical for Data Protection

Growing Cyber Risks Show Why Real-Time Detection Is Cri...

Cyber threats are evolving rapidly with AI-driven attacks, advanced phishing, ra...

CISA KEV List Update Shows Sharp Increase in Actively Exploited Vulnerabilities

CISA KEV List Update Shows Sharp Increase in Actively E...

The Known Exploited Vulnerabilities (KEV) list is maintained by CISA to track so...

Inter-State Crime Gang Used Google Maps for Digital Surveillance, Case Highlights Tech Misuse

Inter-State Crime Gang Used Google Maps for Digital Sur...

Jharkhand Police arrested an inter-state crime gang that misused Google Maps for...

Cyber Threats Intensify in India as Report Highlights Security Gaps Across Key Sectors

Cyber Threats Intensify in India as Report Highlights S...

As per the India Cyber Threat Report 2026 published by Seqrite, India witnessed ...