China has reportedly developed a deep-sea device capable of operating at depths of up to 13,000 feet,...
cybersecurity
Smartphones have become prime targets for cyber threats, from border surveillance to sophisticated malware. For organizations, securing...
Microsoft has quietly addressed a bug affecting Start Menu jump lists on Windows 10 version 22H2 systems....
Cybercriminals are increasingly targeting WhatsApp accounts to impersonate victims and conduct fraudulent activities, such as emergency scams...
Security operations teams face increasing pressure to respond to threats faster while maintaining accuracy. Traditional forensic methods...
Cyber warfare has evolved beyond traditional hacking, with nation-state actors and organized groups targeting critical infrastructure, supply...
As organizations accelerate digital transformation initiatives, security leaders face the dual challenge of enabling innovation while mitigating...
April 2025 marked one of the most intense periods for cybersecurity professionals worldwide, with unprecedented levels of...
A developer at Elon Musk’s artificial intelligence company xAI accidentally leaked a private API key on GitHub,...
Cybersecurity professionals are increasingly looking to criminal justice principles to refine detection engineering strategies. By adopting concepts...
Huntress Labs, known for its focus on managed service providers (MSPs) and small-to-medium business (SMB) security, made...
Cybersecurity firm F6 has identified a new investment scam impersonating the Russian state-funded “Defenders of the Fatherland”...
The Russian cybersecurity firm “Stakhanovets” has obtained a permanent license from the Federal Service for Technical and...
Russian cybersecurity firm Servicepipe has certified over 40 engineers in advanced network threat defense techniques through its...
VolgaBlob’s Smart Monitor platform has expanded its partnership with Perspektivny Monitoring (part of InfoTeKS Group) to integrate...
South Korea’s largest mobile carrier, SK Telecom (SKT), is scrambling to contain the fallout from a massive...
The Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog with CVE-2025-31324,...
A set of critical vulnerabilities in Apple’s AirPlay Protocol and AirPlay SDK, collectively dubbed “AirBorne,” exposes devices...
France’s data protection authority, the CNIL, is escalating enforcement measures against companies failing to secure sensitive data...
Delta Electronics’ ISPSoft programming software, widely used in industrial automation systems, contains multiple critical vulnerabilities that could...