Jane Devry
31
Jan
2025

5 cybersecurity practices for custom software development

Whether you are going to build a custom CRM system, custom ERP tool, or any other bespoke solution, you need…

Nine out of ten emails are spam
31
Jan
2025

Nine out of ten emails are spam

Now, more than ever, users can fall prey to word-perfect AI-created phishing campaigns, subtle BEC messages that sound remarkably like…

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution
31
Jan
2025

Windows Vulnerability in COM Objects Let Attackers Trigger Remote Command Execution

James Forshaw of Google Project Zero has shed light on a significant security vulnerability in Windows related to accessing trapped…

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users
31
Jan
2025

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the largest hacking forums globally—Cracked.io and…

Platformization is key to reduce cybersecurity complexity
31
Jan
2025

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according…

VMware Aria Flaws
31
Jan
2025

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

Jan 31, 2025Ravie LakshmananVulnerability / Data Security Broadcom has released security updates to patch five security flaws impacting VMware Aria…

Tata Technologies Hacked - Ransomware Attack Compromises IT Systems
31
Jan
2025

Tata Technologies Hacked – Ransomware Attack Compromises IT Systems

In a recent disclosure to the stock exchanges, Tata Technologies Limited announced that it has been the victim of a…

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control
31
Jan
2025

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link’s DSL-3788 routers, specifically hardware revisions Ax/Bx running…

Naveen Goud
31
Jan
2025

Ransomware attack makes Tata Technologies suspend whole of its IT services

Tata Technologies, a multinational business that is into the sector of Technology engineering from India has released a press statement…

Deploying AI at the edge: The security trade-offs and how to manage them
31
Jan
2025

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new…

Cybersecurity threat
31
Jan
2025

Tackling Next Wave Of Digital Attacks

As we step into 2025, the cybersecurity landscape is evolving at an unprecedented pace. The frequency of cyberattacks continues to…

New Jailbreak Techniques Expose DeepSeek LLM Vulnerabilities, Enabling Malicious Exploits
31
Jan
2025

New Jailbreak Techniques Expose DeepSeek LLM Vulnerabilities, Enabling Malicious Exploits

Recent revelations have exposed critical vulnerabilities in DeepSeek’s large language models (LLMs), particularly DeepSeek-R1, through advanced jailbreaking techniques. These exploits,…