X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data
26
Aug
2025

X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data

A comprehensive study examining the location data practices of the top 10 social media platforms has uncovered concerning patterns of…

Dartmouth College’s infrastructure head on solving the VMware puzzle and serving Ivy League needs
26
Aug
2025

Dartmouth College’s infrastructure head on solving the VMware puzzle and serving Ivy League needs

Ty Peavey is a proud man – not proud as in ‘arrogant’, but he can rightly pat himself on the…

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof
26
Aug
2025

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof

Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary…

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
26
Aug
2025

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

Aug 26, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…

Why digital transformation has a physical address
26
Aug
2025

Why digital transformation has a physical address

For the better part of a decade, digital transformation has been discussed in terms of apps, data and cloud platforms….

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection

A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the…

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
26
Aug
2025

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans to begin verifying the identity of all developers…

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised
26
Aug
2025

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised

French retail giant Auchan announced on August 21 that it fell victim to a cyberattack that resulted in the theft of loyalty…

Protecting farms from hackers: A Q&A with John Deere's Deputy CISO
26
Aug
2025

Protecting farms from hackers: A Q&A with John Deere’s Deputy CISO

Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in…

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s
26
Aug
2025

Hackers Actively Scanning to Exploit Microsoft Remote Desktop Protocol Services 30,000+ IP’s

A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP…

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers
26
Aug
2025

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert after adding three critical vulnerabilities to its…

The energy sector has no time to wait for the next cyberattack
26
Aug
2025

The energy sector has no time to wait for the next cyberattack

The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability…