spot_img

Global

UNC1549 Breaches 34 Devices Across 11 Telecom Companies Using LinkedIn Job Scams and MINIBIKE Malware

Cyber Espionage Alert: UNC1549 Targets European Telecoms Overview of UNC1549 and Their Methods A cyber espionage group linked to Iran, known as UNC1549, has recently been...

Healthcare Breaches Affect 600K, Major ShinyHunters Hacks, and DeepSeek’s Coding Bias Revealed

Weekly Cybersecurity News Roundup In an ever-evolving digital landscape, staying informed about recent developments in cybersecurity is crucial. Here’s a roundup of notable stories that...

Urgent: Patch GoAnywhere MFT Vulnerability in Fortra Fixes 10.0 Now!

Fortra has recently addressed a critical vulnerability in its GoAnywhere Managed File Transfer (MFT) software. Users are strongly encouraged to apply the...

JLR Cyberattack Sparks National Crisis in the UK

Impact of the Jaguar Land Rover Cyberattack: A Growing Concern for the UK Since September 1, Jaguar Land Rover...

Critical Vulnerability in WatchGuard Firebox VPN: CVE-2025-9242

Addressing CVE-2025-9242: WatchGuard Firebox Firewall Vulnerability Overview of the Vulnerability WatchGuard Technologies has recently announced critical security updates for its Firebox firewall devices, focusing on a...

Cyber Fraud in Prayagraj: ‘Doosri Radha’ Scams ₹4.32 Lakh

Cyber Fraud in Prayagraj: The Doosri Radha Scam In a concerning incident in Prayagraj, a cybercriminal used a fabricated online identity, "Doosri Radha," to scam...

NSW Government Prohibits Creation and Distribution of Explicit Deepfakes

NSW Government Enacts Tough Laws Against Sexually Explicit Deepfakes The New South Wales (NSW) government has taken significant steps to combat the growing issue of...

CISA Alerts on Malware Targeting Ivanti EPMM Vulnerabilities CVE-2025-4427 and CVE-2025-4428

Sep 19, 2025Ravie LakshmananData Breach / Vulnerability CISA Alerts on Recent Malware Discovery Linked to Ivanti Security Flaws In a critical announcement,...

ChatGPT Faces Server-Side Data Theft Attack

Understanding the ShadowLeak Attack: What You Need to Know Introduction to ShadowLeak Recently, cybersecurity experts at Radware uncovered a concerning attack method termed ShadowLeak, which exploits...

CISO Insights Podcast Series: Black Hat USA 2025

The Evolving Role of the Chief Information Security Officer in 2025 In today's rapidly changing digital landscape, the position of a Chief Information Security Officer...

Qilin Dominates Ransomware Landscape Amid Rising New Threats

Ransomware Landscape Update: Qilin Still on Top Amid Threatening Rivals In August, Qilin confirmed its position as the leading ransomware group, though it's facing increasing...

UK Arrests Key LAPSUS$ Hacker Behind Scattered Attacks

UK authorities recently apprehended a 19-year-old individual, Thalha Jubair, who is alleged to be a pivotal member of the notorious Scattered LAPSUS$ Hunters cybercriminal...
spot_img

Recent Articles