SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular web-based IT…
Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay techniques to exploit checkout…
Jaguar Land Rover (JLR) has announced an extension of its production shutdown until October 1, 2025, following a major cyberattack…
The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index…
Chromium-based browsers, including Chrome, Edge, and Brave, manage installed extensions via JSON preference files stored under %AppData%GoogleUser DataDefaultPreferences (for domain-joined machines)…
Geopolitical tensions worldwide can have a foreseeable impact on an organisation’s physical operations, but they can also heighten the risk…
Attackers have discovered a way to exploit Google’s core services, Google Meet, YouTube, Chrome update servers and more using a…
24 Sep Hacks And Identity Theft Hit Harder Than Ever. Consumers Are Prime Targets. Posted at 08:52h in Blogs by…
Suspected state-sponsored attackers have exploited a zero-day vulnerability (CVE-2025-59689) in the Libraesva Email Security Gateway (ESG), the Italian email security…
Police are using drones as flying automated license plate readers (ALPRs), according to a report by the Electronic Frontier Foundation…
Sep 24, 2025Ravie LakshmananMalware / Windows Security Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that…
The recent cyberattack aimed at aerospace and defense company Collins Aerospace, which has caused significant disruptions at major airports in…










