New York Bans DeepSeek Over Potential Data Risks
New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on...
Read more →New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on...
Read more →Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on...
Read more →January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat...
Read more →Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers. These cyber...
Read more →Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike. One new entrant into the world...
Read more →A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through fraudulent mobile applications. Dubbed “FinStealer,” this...
Read more →A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies. The attack,...
Read more →South Korea’s National Intelligence Service (NIS) has raised alarms over the Chinese artificial intelligence app, DeepSeek, accusing it of “excessively”...
Read more →A series of critical security vulnerabilities have been identified in Progress Software’s LoadMaster application, potentially allowing remote attackers to execute...
Read more →Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that...
Read more →Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and vulnerable to a critical security flaw...
Read more →Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has been actively exploited in targeted attacks...
Read more →