Marks & Spencer (M&S), one of the UK’s largest retailers, experienced a significant cyber incident during Easter...
cybersecurity
With the increasing reliance on digital systems, cybersecurity has become one of the most in-demand professions globally....
CyberArk has introduced a new solution, CyberArk Secure AI Agents, designed to address the growing security challenges...
A critical authentication bypass vulnerability (CVE-2023-44752) has been identified in the Apache Student Study Center Desk Management...
A critical vulnerability (CVE-2025-2764) in CarlinKit CPC200-CCPA devices allows network-adjacent attackers to bypass cryptographic signature checks and...
A critical SQL injection vulnerability (CVE-2025-43949) has been identified in MuM MapEdit version 24.2.3, posing significant risk...
A critical vulnerability (CVE-2025-1049) affecting Sonos Era 300 speakers has been disclosed, allowing network-adjacent attackers to execute...
Schleswig-Holstein’s prison system is facing a growing challenge with the smuggling of New Psychoactive Substances (NPS), often...
Over 4.5 million individuals had their protected health information (PHI) exposed due to a misconfigured Google Analytics...
Enterprises increasingly rely on AI models and chatbots, but securing access to these tools presents unique challenges....
The UK government has announced the Cybersecurity and Resilience Bill, set to take effect by late 2025,...
The widely used xrpl.js library, a critical component for interacting with the XRP Ledger, was compromised in...
Internet infrastructure company Cloudflare reported a significant milestone in its Q1 2025 disruption summary: for the first...
Attackers are increasingly exploiting older, resurgent vulnerabilities—flaws that were patched years ago but remain unaddressed in many...
Cybercriminals are increasingly exploiting Near Field Communication (NFC) technology to conduct large-scale fraud at ATMs and Point-of-Sale...
On March 10–11, 2025, X (formerly Twitter) experienced widespread outages, with over 40,000 user reports logged on...
The integration of Jatoba DBMS and Indeed PAM has been confirmed as compatible, offering organizations enhanced security...
A new wave of malware targeting Apple devices has raised alarms among cybersecurity professionals. Dubbed “Infostealer,” this...
Multiple critical vulnerabilities have been identified in the TP-Link VN020 F3v(T) router running firmware version TT_V6.2.1021, exposing...
A critical authentication bypass vulnerability (CVE-2022-40684) affecting Fortinet’s FortiOS, FortiProxy, and FortiSwitchManager has been actively exploited since...