Deepfakes and stolen Personally Identifiable Information (PII) can be used for more than hoaxes, phishing, and identity theft. Now, these…
A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an…
The eSentire Threat Response Unit (TRU) revealed that threat actors are actively exploiting a six-year-old IIS vulnerability in Progress Telerik…
Given the tremendous growth in cyberattacks during the COVID pandemic, it may be tempting to assume that external threats must…
The Cybersecurity and Infrastructure Security Agency (CISA) has released nine advisories targeting security vulnerabilities in Industrial Control Systems (ICS). These…
Smartwatches have rapidly gained popularity due to their convenience, health-tracking capabilities, and seamless connectivity with smartphones and other devices. However,…
A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…
RansomHouse gang claims to have stolen over 450GB from AMD semiconductor company. “On June 27, we became aware that a…
In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…
National Security Agency (NSA) of the United States, primarily known for its intelligence-gathering and surveillance activities in the name of…
Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…










