Volvo Group Employee Data Stolen in Ransomware Attack
Truck, bus and industrial equipment maker Volvo Group North America is notifying current and former employees of a data breach...
Read more →Truck, bus and industrial equipment maker Volvo Group North America is notifying current and former employees of a data breach...
Read more →Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today announced the...
Read more →A fresh wave of domain-confusion phishing emails is sweeping through the Python community, once again setting its sights on PyPI...
Read more →A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity...
Read more →Cisco has publicly disclosed a critical remote code execution (RCE) vulnerability, tracked as CVE-2025-20352, affecting its widely deployed Cisco IOS...
Read more →A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library (CVE-2025-23298) enables unauthenticated attackers to achieve remote code execution (RCE) with root...
Read more →Security researchers at Hacker House have released SetupHijack, a proof-of-concept tool that exploits race conditions and insecure file handling in...
Read more →ESET Research has published new findings on DeceptiveDevelopment, also called Contagious Interview. This North Korea-aligned group has become more active...
Read more →Sep 25, 2025Ravie LakshmananSoftware Security / Malware Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called...
Read more →Zoom has thrown down the gauntlet in the enterprise artificial intelligence (AI) race, with the announcement that AI Companion 3.0...
Read more →Cisco on Wednesday announced patches for 14 vulnerabilities in IOS and IOS XE, including a bug that has been exploited...
Read more →Numerous mobile applications have been found to expose critical user information through misconfigured Firebase services, allowing unauthenticated attackers to access...
Read more →