This article presents key findings from 2024 reports on data breaches. Breaches are taking longer to resolve and are becoming…
SafeBreach Labs’ researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked…
Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within…
Recently, a growing conversation has emerged on tech forums regarding the potential privacy risks posed by smart gadgets, particularly the…
Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity….
Jan 01, 2025Ravie LakshmananWeb Security / Vulnerability Threat hunters have disclosed a new “widespread timing-based vulnerability class” that leverages a…
U.S. Treasury sanctions Russian and Iranian entities for interfering in the presidential election Pierluigi Paganini January 01, 2025 The U.S….
Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake “Army+” application websites, which host a malicious installer…
The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability. Exploitable…
In the ever-evolving landscape of digital security, maintaining trust is paramount. When a Certification Authority (CA) is no longer trusted…
Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Tuesday…
If you’re worried about possible expansions of government surveillance and access to your information, or simply want to do some…











