HPE Hewlett Packard Enterprise
20
Jan
2025

HPE investigates breach as hacker claims to steal source code

Hewlett Packard Enterprise (HPE) is investigating claims of a new breach after a threat actor said they stole documents from…

TikTok awaits Trump reprieve as China signals open to deal
20
Jan
2025

TikTok awaits Trump reprieve as China signals open to deal – Software

President Donald Trump is expected to grant TikTok more time to strike a deal after he returns to power as…

15,000 Fortigate Firewall Configs Leaked By Belsen Group
20
Jan
2025

Belsen Group Leaks 15,000+ FortiGate Firewall Configurations

FortiGate firewall leak exposes 15,000+ configurations, impacting organizations globally. The actor behind the leak is Belsen Group. Learn how to…

Windows Server
20
Jan
2025

Microsoft fixes Windows Server 2022 bug breaking device boot

Microsoft has fixed a bug that was causing some Windows Server 2022 systems with two or more NUMA nodes to…

Android Malware
20
Jan
2025

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

Jan 20, 2025Ravie LakshmananAndroid / Malware The Threat actor known as DoNot Team has been linked to a new Android…

Beyond Passwords: Transforming Access Security with Passwordless IAM
20
Jan
2025

Beyond Passwords: Transforming Access Security with Passwordless IAM

Ever found yourself locked out of an account at the worst possibility? While rushing to meet a deadline or accessing…

Tunneling Protocols
20
Jan
2025

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

Jan 20, 2025Ravie LakshmananNetwork Security / Vulnerability New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow…

TikTok is restoring service, thanks Trump
20
Jan
2025

TikTok is restoring service, thanks Trump – Security

TikTok said it was restoring its service in the US after President-elect Donald Trump said he would revive the app’s…

A complete guide to exploiting open URL redirect vulnerabilities
20
Jan
2025

A complete guide to exploiting open URL redirect vulnerabilities

Open URL redirect vulnerabilities are easy to find as they are quite common in applications. This vulnerability type is also…

Naveen Goud
20
Jan
2025

Cyber Threats lurking in YouTube Comments

YouTube, a popular video-sharing platform owned by Google and a subsidiary of Alphabet Inc., is known for offering a vast…

7 Steps International Organizations Must Take to Defend Critical National Infrastructure
20
Jan
2025

7 Steps International Organizations Must Take to Defend Critical National Infrastructure

Critical national infrastructure (CNI) is at risk in countries across the globe. When attackers target CNI systems—which include power plants,…

surveillance pricing
20
Jan
2025

Your location or browsing habits could lead to price increases when buying online

Companies are showing customers different prices for the same goods and services based what data they have on them, including…