The list of data is long. Names, professions, blood groups, parents’ names, phone numbers, the length of calls, vehicle registrations,…
As previously reported, three high-severity vulnerabilities in Kubernetes existed in Ingress controllers for NGINX. In addition to this, another high-severity…
The U.S. Department of Health and Human Services Office for Civil Rights has reported a massive data breach involving Perry…
The notorious Medusa ransomware gang has set its sights on Toyota Financial Services in Germany, claiming to have successfully exfiltrated…
Samsung Electronics (U.K.) Limited has announced a cybersecurity incident, corroborating the exposure of customer data that originated in July 2019. …
In a move that blurs the lines between cybercrime and regulatory action, the ALPHV/BlackCat ransomware group has reportedly taken an…
The infamous INC Ransom ransomware group, renowned for its bold attacks on a variety of organizations, claims to have successfully…
Wireshark is a popular open-source network protocol analyzer that is primarily used by security experts and network administrators for several…
Three prominent firms have become the latest targets of the notorious LockBit ransomware group, escalating concerns in the cybersecurity community….
FBI and CISA warn of attacks by Rhysida ransomware gang Pierluigi Paganini November 16, 2023 The FBI and CISA warn…
CacheWarp is a new software-based fault attack that allows attackers to gain access to encrypted virtual machines (VMs) and escalate privileges…
A critical CPU vulnerability can pose a significant threat by allowing:- Unauthorized access to sensitive data Enabling malicious code execution…