Deep Dive Into Major Dating App Breach That Exposed Private Images
TechRadar Pro recently reported that five dating apps exposed over 1.5 million private and explicit images after storing the images in cloud storage buckets without any password…
TechRadar Pro recently reported that five dating apps exposed over 1.5 million private and explicit images after storing the images in cloud storage buckets without any password…
Artificial Intelligence (AI) adoption in India is gaining ground, although at a measured pace. A new report released as part of Lenovo’s “CIO Playbook 2025:…
Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the wild, exposing users to potential…
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a…
The FBI has issued a public appeal for information concerning an ongoing cyber campaign targeting US telecommunications infrastructure, attributed to actors affiliated with the People’s…
Operation SyncHole: Lazarus APT targets supply chains in South Korea Pierluigi Paganini April 25, 2025 The North Korea-linked Lazarus Group targeted at least six firms…
A hacking collective identifying itself as R00TK1T has claimed responsibility for a massive data breach affecting TikTok, allegedly exposing the credentials of more than 900,000…
The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By examining over 2 billion blocked…
Silent Push reveals a complex scheme where North Korean hackers posed as crypto companies, using AI and fake job interviews to distribute malware. Protect yourself…
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the…
A sophisticated new phishing toolkit named “SessionShark” has been specifically designed to circumvent Microsoft Office 365’s multi-factor authentication (MFA) protections. SessionShark is being marketed on…
A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin and PetitPotato malware. Cybersecurity researchers…