A comprehensive study examining the location data practices of the top 10 social media platforms has uncovered concerning patterns of…
Ty Peavey is a proud man – not proud as in ‘arrogant’, but he can rightly pat himself on the…
Android droppers have evolved from niche installers for heavyweight banking Trojans into universal delivery frameworks, capable of deploying even rudimentary…
Aug 26, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…
For the better part of a decade, digital transformation has been discussed in terms of apps, data and cloud platforms….
A stealthy espionage campaign emerged in early 2025 targeting diplomats and government entities in Southeast Asia and beyond. At the…
Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans to begin verifying the identity of all developers…
French retail giant Auchan announced on August 21 that it fell victim to a cyberattack that resulted in the theft of loyalty…
Agriculture is a connected, software-driven industry where cybersecurity is just as essential as tractors and harvesters. From embedded hardware in…
A massive coordinated scanning campaign targeting Microsoft Remote Desktop Protocol (RDP) services, with threat actors deploying over 30,000 unique IP…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert after adding three critical vulnerabilities to its…
The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability…











