spot_img

Global

Cybersecurity Agency: Increased Attacks Targeting EU’s Operational Technology

ENISA's 2025 Threat Landscape Report: A Deep Dive into Cybersecurity Challenges The European Union Agency for Cybersecurity (ENISA) has released its 2025 Threat Landscape report,...

JLR and M&S Struggle After Costly Ransomware Attacks

Understanding the Rise of Ransomware and Its Impact on Businesses The Scope of Ransomware Threats A recent report from Hiscox sheds light on the alarming prevalence...

JLR Restarts Factory Production After Cyber Attack Delays

Jaguar Land Rover Faces Cyber Attack and Operational Challenges Jaguar Land Rover (JLR), the iconic car manufacturer under Tata Motors in India, recently revealed it...

OneLogin Vulnerability Exposes API Keys, Allowing App Impersonation and OIDC Secrets Theft

High-Severity Vulnerability Discovered in OneLogin IAM Solution On October 1, 2025, a significant security flaw has come to light within the One Identity OneLogin Identity...

Chinese APT ‘Phantom Taurus’ Targets Organizations Using Net-Star Malware

Phantom Taurus: The Covert Cyber Threat Targeting Global Organizations Introduction to Phantom Taurus Palo Alto Networks has unveiled a sophisticated hacking group known as 'Phantom Taurus,'...

Missouri Bank and Great American Locked in $2.3 Million Bond Dispute

Great American Insurance Moves to Void $2.3 Million Bond Over Fraud Allegations Great American Insurance Group is making headlines after announcing its intention to void...

Anubis Ransomware Group Targets Storage King UK

Anubis Ransomware Gang Targets Storage King UK: A Data Breach Breakdown What Happened? In a concerning turn of events for Storage King UK, the Anubis ransomware...

New WireTap Attack Exposes Intel SGX ECDSA Key through DDR4 Memory-Bus Interposer

Recent Research Exposes Vulnerabilities in Intel SGX Security Introduction to Intel SGX Recent findings from researchers at Georgia Institute of Technology and Purdue University have raised...

OpenSSL Vulnerabilities Enable Private Key Theft, Code Execution, and Denial-of-Service Attacks

## New OpenSSL Versions Released to Address Security Vulnerabilities The OpenSSL Project has unveiled several updated versions of its open-source SSL/TLS toolkit, aimed at addressing...

FTC Takes Action Against Sendit App and CEO for Illegally Collecting Children’s Data

FTC Takes Action Against Sendit for Alleged Data Violations The Federal Trade Commission (FTC) has initiated legal proceedings against the social application Sendit and its...

Edelweiss AIF Settles SEBI Case with ₹61.42 Lakh Payment; Key Officials Banned for One Year

Edelweiss Fund Trust Settles with SEBI: A Closer Look at the Findings The Securities and Exchange Board of India (SEBI) recently wrapped up adjudication proceedings...

Uncovering Deception: How an Akira Affiliate Conceals Malicious Activities

Unmasking Akira: Cybersecurity Insights on Evolving Ransomware Tactics Overview of Akira's Operations The Akira ransomware-as-a-service (RaaS) group has ramped up its activities, particularly targeting organizations in...
spot_img

Recent Articles