Category: CyberSecurityNews
Threat actors use Remote Desktop Protocol (RDP) to gain unauthorized access to computers and networks, fully control systems, extract sensitive…
Threat actors are leveraging cloud storage services like Google Drive, OneDrive, and Dropbox to distribute malware and steal user information…
A popular hybrid biometric terminal manufactured by ZKTeco has been found to have several critical vulnerabilities, including a significant flaw…
Privacy regulators in Canada and the United Kingdom have initiated a collaborative inquiry into the genetic testing firm 23andMe in…
Hackers use RATs to get unauthorized access and full control of the victim’s computer and all its functionalities and enable…
Security analysis identified multiple vulnerabilities in the Netgear WNR614 JNR1010V2 N300 router (firmware V1.1.0.54_1.0.1) that could allow attackers to bypass…
Two-factor authentication (2FA) is a security method that requires two verification steps for user access and is commonly implemented with…
The popular Japanese video-sharing website Niconico has suspended its services due to a large-scale cyberattack. Niconico is one of Japan’s…
The notorious TellYouThePass ransomware gang exploits a critical remote code execution (RCE) vulnerability in PHP to compromise servers and deploy…
Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, has announced its acquisition of Lacework, an AI-powered cloud-native…
Apple has introduced a groundbreaking personal intelligence system called “Apple Intelligence” at its Worldwide Developers Conference (WWDC) 2024. This innovative…
A new prompt injection vulnerability has been discovered in the EmailGPT service. This API service and Google Chrome plugin help…











