Threat Actor Allegedly Claims Leak of BMW Customer Database
A well-known threat actor identified as “888” has claimed responsibility for leaking sensitive customer data belonging to BMW Hong Kong....
Read more →A well-known threat actor identified as “888” has claimed responsibility for leaking sensitive customer data belonging to BMW Hong Kong....
Read more →Zyxel has issued patches to address a critical operating system (OS) command injection vulnerability identified as CVE-2024-7261. This vulnerability affects...
Read more →Google has released a patch for a critical zero-day vulnerability, CVE-2024-32896, which was actively exploited in the wild. This vulnerability,...
Read more →Security researchers have uncovered a significant vulnerability in YubiKeys, specifically targeting the YubiKey 5 Series. This vulnerability, identified as a...
Read more →A proof-of-concept (PoC) exploit has been publicly released for a critical zero-day elevation of privilege vulnerability in the Windows kernel....
Read more →Blackwired, the leading cyber observatory for disruptive cybersecurity technologies, has announced the launch of ThirdWatch℠, a groundbreaking solution to identify...
Read more →Three men have pleaded guilty to operating a website that enabled criminals to bypass banking anti-fraud checks, leading to significant...
Read more →A significant security vulnerability has been reported in the DAP-2310, specifically affecting Hardware Revision A with Firmware version 1.16RC028. Hahna...
Read more →Live Webcast from Monaco will Explore the Extraordinary Opportunities in an Era of Explosive Innovation and Growth Cyber A.I. Group,...
Read more →A critical vulnerability has been identified in the Bonjour service, specifically in the mDNSResponder.exe process, which is used for network...
Read more →Chromium is the foundation for many popular web browsers including Google Chrome and Microsoft Edge, and this is the most...
Read more →Hackers often target VPNs for several illicit purposes like injecting malicious code, stealing sensitive data, and many more. Besides this,...
Read more →