A critical vulnerability, identified as CVE-2025-23114, has been discovered in the Veeam Updater component, a key element of multiple Veeam…
RansomHouse gang claims to have stolen over 450GB from AMD semiconductor company. “On June 27, we became aware that a…
In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…
National Security Agency (NSA) of the United States, primarily known for its intelligence-gathering and surveillance activities in the name of…
Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog, adding several newly identified…
Even though the authorities recovered only a fraction of the payment made in Bitcoin three years ago, the victim made…
A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…
Considering the alarm bells around biometric surveillance tech, should we be concerned about the popularity of voice technology? In 2002,…
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…
OpenNHP is the open-source implementation of NHP (Network-resource Hiding Protocol), a cryptography-based zero trust protocol for safeguarding servers and data….
Cybercriminal groups linked to the rogue state have been using Maui ransomware to attack healthcare and public health organizations in…










