SAP fixes suspected Netweaver zero-day exploited in attacks
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. The vulnerability, tracked…
SAP has released out-of-band emergency NetWeaver updates to fix a suspected remote code execution (RCE) zero-day flaw actively exploited to hijack servers. The vulnerability, tracked…
Chief Information Security Officers are facing rising pressure to ensure robust security and compliance across globally distributed environments. Managing multiple security tools and platforms while…
A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000 users. The group, which has…
TechRadar Pro recently reported that five dating apps exposed over 1.5 million private and explicit images after storing the images in cloud storage buckets without any password…
Artificial Intelligence (AI) adoption in India is gaining ground, although at a measured pace. A new report released as part of Lenovo’s “CIO Playbook 2025:…
Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the wild, exposing users to potential…
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface is a…
The FBI has issued a public appeal for information concerning an ongoing cyber campaign targeting US telecommunications infrastructure, attributed to actors affiliated with the People’s…
Operation SyncHole: Lazarus APT targets supply chains in South Korea Pierluigi Paganini April 25, 2025 The North Korea-linked Lazarus Group targeted at least six firms…
A hacking collective identifying itself as R00TK1T has claimed responsibility for a massive data breach affecting TikTok, allegedly exposing the credentials of more than 900,000…
The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By examining over 2 billion blocked…
Silent Push reveals a complex scheme where North Korean hackers posed as crypto companies, using AI and fake job interviews to distribute malware. Protect yourself…