Hong Kong launches probe after voters’ personal details posted on social media
Hong Kong authorities have launched an investigation after the personal details of “some voters were uploaded to a social media platform” ahead of the Legislative…
Hong Kong authorities have launched an investigation after the personal details of “some voters were uploaded to a social media platform” ahead of the Legislative…
The Federal Communications Commission (FCC) has rolled back a previous ruling that required U.S. telecom carriers to implement stricter cybersecurity measures following the massive hack…
Retailers are facing a sharp rise in targeted ransomware activity as the holiday shopping season begins. Threat groups are timing their attacks to peak sales…
Microsoft disclosed a critical authentication bypass vulnerability in Azure Bastion, its managed remote access service, enabling attackers to escalate privileges to administrative levels with a…
Salesforce, a renowned customer relationship management (CRM) platform, has confirmed it is dealing with a significant security incident. The company announced late Wednesday that some…
We’re seeing a surge in phishing calendar invites that users can’t delete, or that keep coming back because they sync across devices. The good news…
Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or…
As the dust settled on a historically close-run Dutch election, a remarkable trend emerged. While party leaders were focused on traditional campaign issues, voters used…
Driven by a commitment to make cutting-edge scam protection available to everyone, Avast, a leader in digital security and privacy and part of Gen, has…
One quiet morning in April 2025, officials at DaVita, one of the largest kidney dialysis providers in the United States, were jolted by a wireless…
SolarWinds addressed three critical flaws in Serv-U Pierluigi Paganini November 21, 2025 SolarWinds patched three critical vulnerabilities in its Serv-U file transfer solution that could…
Nobody embarks on a career in cyber security expecting an easy ride. It’s widely recognised that protecting critical digital infrastructure is high-pressure and high-stakes work. …