Several security experts have recently discovered that Xiaomi Android devices are suffering from a range of security vulnerabilities that affect…
Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you’re a…
Quantifying Cyber Risk: A Business Imperative One of the most pressing issues for businesses today is understanding cyber risk in…
El Salvador suffered a massive leak of biometric data Pierluigi Paganini May 06, 2024 Resecurity found a massive leak involving…
A highly concerning security loophole was recently discovered in a WordPress plugin called “Email Subscribers by Icegram Express,” a popular…
MedStar Health, a primary healthcare provider in the United States, has reported a significant data breach involving unauthorized access to…
Despite NSO Group’s claims, spyware has continued to target journalists, dissidents, and protesters. Saudi journalist and dissident Jamal Khashoggi’s wife,…
The BlackBasta ransomware / cyber extortion gang is behind the recent cyber attack that resulted in the temporary shutdown of…
The Australian privacy commissioner warned the Australian public that third-party suppliers serve as “a real weak spot” to safeguard customer…
The alignment between security teams and executive management is crucial. However, a significant communication gap within organizations is increasingly becoming…
The Damselfly Advanced Persistent Threat (APT) group, also known as APT42, has been actively utilizing custom backdoor variants, NiceCurl and…
May 06, 2024NewsroomAndroid / Data Security Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi…











