North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In…
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In…
Marks and Spencer (M&S) has suspended all sales via its website and mobile application as it continues to work to contain an unspecified cyber security…
A recent Windows security update that creates an ‘inetpub’ folder has introduced a new weakness allowing attackers to prevent the installation of future updates. After…
Lattica’s Mission: Making Private AI a Reality with the Power of Fully Homomorphic Encryption In the buzz-heavy world of AI and cybersecurity, it’s not every…
A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000 users. The group, which has…
Baltimore City Public Schools notified tens of thousands of employees and students of a data breach following an incident in February when unknown attackers hacked…
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. The vulnerability, tracked…
Chief Information Security Officers are facing rising pressure to ensure robust security and compliance across globally distributed environments. Managing multiple security tools and platforms while…
A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000 users. The group, which has…
TechRadar Pro recently reported that five dating apps exposed over 1.5 million private and explicit images after storing the images in cloud storage buckets without any password…
Artificial Intelligence (AI) adoption in India is gaining ground, although at a measured pace. A new report released as part of Lenovo’s “CIO Playbook 2025:…
Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the wild, exposing users to potential…