Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt…
The Chinese University of Hong Kong (CUHK) has been confronted by a massive data breach that has compromised personal information…
Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are…
A threat actor has claimed responsibility for leaking the personal data of 5 million Ecuadorian citizens. The announcement was made…
Cloud identity protection company Permiso has created YetiHunter, a threat detection and hunting tool companies can use to query their…
CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June…
In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through…
Jun 14, 2024NewsroomDevice Security / Authentication An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered…
Former subpostmasters and Post Office branch staff who were wrongfully convicted of crimes based on flawed computer evidence in Scotland…
Hacktivist group 177 Members Team has claimed a cyberattack on Malaysia’s leading internet service provider, Unifi TV. The Unifi TV…
Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery efforts following a recent cybersecurity breach….
The U.S. food chain giant Panera Bread has begun notifying its employees of a significant data breach that occurred as…










