spot_img

Global

Protecting Your Property Deposit: How Scammers Target Your Funds

The Rising Threat of Real Estate Phishing Scams: What You Need to Know In today’s digital age, security breaches and phishing scams are becoming increasingly...

Docker Addresses Critical Vulnerability in Gordon AI Allowing Code Execution via Image Metadata

A Significant Security Flaw in Docker's AI Assistant In recent developments, cybersecurity experts have uncovered a serious vulnerability in Ask Gordon, an artificial intelligence (AI)...

Major vLLM Vulnerability Poses Remote Code Execution Risk to Millions of AI Servers

Critical Security Flaw Discovered in vLLM: Millions of Servers at Risk A significant security vulnerability has been...

Join Lt Gen (Dr) Rajesh Pant for a Free Webinar on AI-Driven Cyber Threats!

Join Us for an Insightful AI Cybersecurity Webinar in February 2026 Cyble, in collaboration with The Cyber Express, is set to host a pivotal webinar...

APT28 Exploits Microsoft Office Zero-Day Just Hours After Disclosure

Urgent Cyber Threat: Russia's APT28 Exploits Microsoft Zero-Day Vulnerability Recent intelligence from Ukraine's cyber defense teams has unveiled a sophisticated operation by Russian state-sponsored hackers...

Ex-IPS Officer Who Led Operation Cocoon Honored with Padma Shri for Ending Veerappan’s Reign

K. Vijay Kumar Honored with Padma Shri for His Role in Operation Cocoon The Government of India has recently awarded the Padma Shri, its fourth-highest...

Rajasthan’s Shocking Ruling on Life Imprisonment, Parole, and Love

High-Profile Parole Case Sparks Nationwide Debate on Criminal Justice An Unusual Parole Decision A remarkable case originating from Rajasthan has stirred up significant discussions across India...

Targeted Multi-Stage Phishing Campaign Hits Russia with Amnesia RAT and Ransomware

Multi-Stage Phishing Campaign Targets Russian Users with Ransomware Overview of the Attack A new multi-stage phishing campaign has emerged, specifically targeting users in Russia with ransomware...

New DynoWiper Malware Targets Polish Power Sector in Sandworm Attack

Major Cyber Attack on Poland's Power System by Sandworm Background of the Attack In late December 2025, Poland faced what has been characterized as one of...

CISA Adds Five New Vulnerabilities to Exploited Software Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) Catalog, adding five significant software flaws within...

Phishing Kits Team Up with Phone Scammers to Bypass Multifactor Authentication

New Phishing Toolkits Targeting Voice Communication Understanding the Shift in Phishing Techniques Recent research has unveiled a new trend in phishing tactics that utilize voice communication—often...

Health Data Breach Raises Alarm Over Impersonation and Phishing Risks

## Ongoing Concerns Following Manage My Health Data Breach The recent data breach involving Manage My Health, a popular digital health platform in New Zealand,...
spot_img

Recent Articles