A cyber hub in Gurgaon, India. The country has a thriving US$150 billion outsourcing industry. Photo: Xinhua
04
Dec
2025

India’s ‘back office’ reputation under threat amid rise in sophisticated cyber scams

India’s hard-won reputation as the world’s back office, built on trusted call-centre and IT services, is coming under pressure as…

Akamai Patches HTTP Request Smuggling Vulnerability in Edge Servers
04
Dec
2025

Akamai Patches HTTP Request Smuggling Vulnerability in Edge Servers

A critical HTTP request smuggling vulnerability in Akamai’s edge server infrastructure has been successfully fixed. The vulnerability, identified as CVE-2025-66373,…

The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE
04
Dec
2025

The Louisiana Department of Wildlife and Fisheries Is Detaining People for ICE

The Louisiana Department Of Wildlife And Fisheries (LDWF), typically responsible in part for overseeing wildlife reserves and enforcing local hunting…

PickleScan Uncovers 0-Day Vulnerabilities Allowing Arbitrary Code Execution via Malicious PyTorch Models
04
Dec
2025

PickleScan Uncovers 0-Day Vulnerabilities Allowing Arbitrary Code Execution via Malicious PyTorch Models

JFrog Security Research has uncovered three critical zero-day vulnerabilities in PickleScan, a widely-adopted industry-standard tool for scanning machine learning models…

5 Threats That Reshaped Web Security This Year [2025]
04
Dec
2025

5 Threats That Reshaped Web Security This Year [2025]

As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become…

UK's Cookie Enforcement Campaign Brings 95% Of Top Websites Into Compliance
04
Dec
2025

UK’s Cookie Enforcement Campaign Brings 95% Of Top Websites Into Compliance

Britain’s data protection regulator issued 17 preliminary enforcement notices and sent warning letters to hundreds of website operators throughout 2025,…

New 'Sryxen' Stealer Bypasses Chrome Encryption via Headless Browser Technique
04
Dec
2025

New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

A new information stealer called Sryxen has emerged in the underground malware market, targeting Windows systems with advanced techniques to…

Western coalition supplying tech to Ukraine prepared for long war
04
Dec
2025

Western coalition supplying tech to Ukraine prepared for long war

A coalition of countries has provided Ukraine with more than €1.3bn of telecommunications, information technology and other high-tech equipment since…

India Withdraws Mandatory Sanchar Saathi Install Order
04
Dec
2025

India Withdraws Mandatory Sanchar Saathi Install Order

India has reversed its earlier directive requiring mobile phone manufacturers and importers to pre-install the government-backed Sanchar Saathi application on all new smartphones…

Defense for Vulnerable React Server Component Workflows — API Security
04
Dec
2025

Defense for Vulnerable React Server Component Workflows — API Security

On December 3, 2025, React maintainers disclosed a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC),…

Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
04
Dec
2025

Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens

A sophisticated phishing toolkit known as Evilginx is empowering attackers to execute advanced attacker-in-the-middle (AiTM) campaigns with alarming success. These…

Fujitsu police contract ‘complicates’ Post Office investigation
04
Dec
2025

Fujitsu police contract ‘complicates’ Post Office investigation

The Metropolitan Police officer leading the national investigation into crimes committed during the Post Office scandal said Fujitsu’s contact to…