Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of users to potential security risks….
Stalkerware, a type of malicious software that allows someone to secretly monitor and track another person’s device, has become a…
Russia-aligned APT group RomCom was behind attacks that leveraged CVE-2024-9680, a remote code execution flaw in Firefox, and CVE-2024-49039, an…
Thank you for joining! Access your Pro+ Content below. 26 November 2024 The Most Influential Women in UK Technology 2024…
U.S. CISA adds Array Networks AG and vxAG ArrayOS flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 26, 2024…
SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users into granting excessive permissions, where…
There are “strong grounds” to raise a complaint against the government to the Parliamentary ombudsman, in regard to its handling…
CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond, LockBit, and Chaos to launch…
The Ursnif banking Trojan, one of the most notorious forms of malware targeting financial data, has been observed in a…
A significant security vulnerability has been discovered in Palo Alto Networks’ GlobalProtect app, potentially allowing attackers to escalate privileges on…
The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment (RTA) conducted on a critical…
A critical vulnerability was discovered on October 30th, 2024 in the Anti-Spam by CleanTalk WordPress plugin, potentially affecting over 200,000…










