Yubico has released a security advisory, YSA-2025-01, which highlighted a vulnerability within the software module that supports two-factor authentication (2FA)…
Threat actor IntelBroker allegedly breached Hewlett Packard Enterprise (HPE) and claimed responsibility for the intrusion on a dark web forum….
Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no longer be available for download or…
A significant cybersecurity threat involving North Korean hackers exploiting LinkedIn as an entry point to infiltrate organizations. This attack has…
Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through…
A sophisticated Android malware campaign targeting users in South Asia, particularly in the Kashmir region of India has been recently…
Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers. The…
With the Budget 2025 soon to be announced, India stands at a pivotal moment in its digital transformation journey, increasingly…
A group of researchers from Eindhoven University of Technology has unveiled a new findings that could significantly improve the efficiency…
The National Bureau of Investigation (NBI), the Philippines’ top investigative agency, has reportedly been compromised, exposing the sensitive data of…
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued sanctions against two entities linked to major…
Elon Musk, the renowned CEO of Tesla and SpaceX, has made waves with a bold statement regarding the cybersecurity vulnerabilities…











