Mozilla warns Germany could soon declare ad blockers illegal
A recent ruling from Germany’s Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a…
A recent ruling from Germany’s Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a…
San Francisco, CA – August 12, 2025 — Addressing the growing demand for data privacy in financial workflows, X-VPN has rolled out an update to…
Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual Composer Metadata Uploader, now designated…
A cyberattack on Manpower’s Michigan office compromised data for 144,000 people. Meanwhile, Workday reveals a data breach in a widespread scam. Read about these incidents…
Thanks to advances in artificial intelligence (AI), starting a career as a novice software developer or retraining to become a software engineer is now far…
China’s new Information Support Force (ISF) has stepped up joint training with other military branches, showcasing an integrated combat system and increased mobile and decentralised…
A sophisticated new cybercriminal technique known as “ghost-tapping” has emerged as a significant threat to contactless payment systems, enabling Chinese-speaking threat actors to exploit stolen…
In 2025, a simple online search can lead to more than just information—it could expose you to the latest trend in cybercrime: malvertising. This evolved…
A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through an out-of-bounds write condition. The…
Face morphing software can blend two people’s photos into one image, making it possible for someone to fool identity checks at buildings, airports, borders, and…
If you are a CISO or cybersecurity leader looking to scale your bug bounty program but are not sure when the right time to do this is, how to do this in…
An app called “Tea” that lets women share “red flags” or feedback about men they have dated has confirmed that hackers have accessed some 72,000…