Hack of US Surveillance Provider RemoteCOM Exposes Court Data
A major data breach has compromised the personal records of nearly 14,000 individuals under court supervision, alongside contact information for thousands of criminal justice employees.…
A major data breach has compromised the personal records of nearly 14,000 individuals under court supervision, alongside contact information for thousands of criminal justice employees.…
Apple has pushed the first security update for its latest iPhone operating system, iOS 26, fixing a single, medium-severity vulnerability, assigned designation CVE-2025-43400, affecting Apple…
Apple on Monday released a fresh round of security updates that address a single medium-severity vulnerability affecting both iOS and macOS. Tracked as CVE-2025-43400, the…
WestJet, a Canadian commercial airline, on Monday said hackers were able to steal certain data, including some passenger information, in a previously disclosed June cyberattack. The…
Hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo package that enables the execution of commands with root-level privileges on Linux operating systems.…
Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new exploit being offered on a…
In late August 2025, Cleafy’s Threat Intelligence team uncovered Klopatra, a new, highly sophisticated Android banking trojan and Remote Access Trojan (RAT) that grants attackers…
Researchers at the Georgia Institute of Technology scrutinized the security of the popular Tile tracker and came out disappointed. Bluetooth trackers are a steadily growing…
Infinidat has expanded its Infinibox family to double the capacity of its biggest all-flash array while cutting its physical footprint. The move will see the…
Several weaknesses patched recently by Google in Gemini could have allowed attackers to trick the AI assistant into helping them achieve data theft and other…
In early 2025, we encountered a mission-critical software component called TRUfusion Enterprise on the perimeter of one of our customers that is used to transfer…
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Nearly 50,000 Cisco firewall devices with recently…