Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY SSH and Telnet…
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a…
Treacle, a cybersecurity startup founded in 2021 by Subhasis Mukhopadhyay, Subhajit Manna, and Partha Das, has raised about 40 million…
Two new vulnerabilities have been discovered in Next.js, related to response queue poisoning and SSRF on certain Next.js versions. These…
Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety and luxury functions. However, vehicle hijacking…
A state or state-sponsored actor orchestrated the “sophisticated” cyberattacks against the British Columbia government networks, revealed the head of B.C.’s…
The notorious hacker known as IntelBroker claims to have successfully breached the European Union Agency for Law Enforcement Cooperation, commonly…
After many months of taunting law enforcement and offering a million-dollar reward to anyone who could reveal his identity, the…
The world of artificial intelligence (AI) is rapidly evolving, offering incredible potential for innovation and progress. However, with great power…
Security flaws in Telit Cinterion cellular modems, widely used in sectors including industrial, healthcare, and telecommunications, could allow remote attackers…
The threat actor behind the recent Dell data breach revealed they scraped information of 49 million customer records using an…
Image: Midjourney Ascension, a major U.S. healthcare network, is diverting ambulances from several hospitals due to a suspected ransomware attack…











