CoinFlip Data Breach Disclosed Data Of 36,646 Individuals
The Bitcoin ATM operator, CoinFlip recently filed a data breach notice with the official Vermont Government. The CoinFlip data breach notification was also shared with…
The Bitcoin ATM operator, CoinFlip recently filed a data breach notice with the official Vermont Government. The CoinFlip data breach notification was also shared with…
A significant data breach has allegedly compromised Airbnb’s security, potentially exposing the personal information of 1.2 million users. A threat actor, who goes by the…
VMware issued security updates to fix a critical vCenter Server vulnerability that can be exploited to gain remote code execution attacks on vulnerable servers. vCenter Server…
As the Global AI Safety Summit prepares to bring together leaders from around the world in November, research reveals that a large majority of UK…
In a concerning development, it has come to light that millions of personally identifiable information (PII) records, including sensitive Aadhaar cards, linked to Indian residents,…
AWS announced it will launch the AWS European Sovereign Cloud, a new, independent cloud for Europe designed to help public sector customers and those in…
Shifting all of the server farm capacity contained within five of Europe’s largest datacentre hubs to places that are powered by renewable energy could cut…
The hospitality industry is increasingly under the microscope due to rising cybersecurity concerns. The MGM Resorts data breach in 2023 stands as a stark illustration…
Inter Press Service (IPS), a global news agency based in Italy was allegedly subjected to a cyberattack. The hacktivist group, Mysterious Team Bangladesh posted a…
Since October 7, 2023, the Israel-Hamas war has grown on cyber-space as much as on the ground. There is a lot of targeting and cyber-war…
A publicised bid to open the Services Australia and Service NSW digital wallets to store multiple government credentials has stalled, with no indication of when…
Threat actors primarily target remote access and control of victims’ devices by employing deceptive tactics. They often create fake apps or pose as legitimate ones…