A guide on securing WebSocket to protect real-time applications from common vulnerabilities. This article covers the security vulnerabilities of WebSocket,…
McLaren Health Care is warning 743,000 patients that the health system suffered a data breach caused by a July 2024…
A Pakistan-based cyber espionage group known as APT36 or Transparent Tribe has launched a highly sophisticated phishing campaign targeting Indian…
In an analysis by FS-ISAC and Akamai, the financial services sector has emerged as the primary target of Distributed Denial…
The CoinMarketCap and CoinTelegraph websites have been compromised over the weekend to serve clever phishing pop-ups to visitors, asking them…
Jun 23, 2025Ravie LakshmananCyber Espionage / Vulnerability Cybersecurity researchers have uncovered a Go-based malware called XDigo that has been used…
Cookies play a crucial role in web applications, but at the same time, they require careful attention to security settings….
The notorious Confucius hacking organization, first exposed by foreign security vendors in 2016, continues to pose a significant threat to…
A series of fraudulent text messages impersonating state Departments of Motor Vehicles (DMVs) has spread throughout the United States tricking…
Russian hackers have bypassed Google’s multi-factor authentication (MFA) in Gmail to pull off targeted attacks, according to security researchers at…
A guide to understanding and implementing Subresource Integrity (SRI) for enhanced web security. Subresource Integrity (SRI) is a security feature…
Nucor, North America’s largest steel producer and recycler, has confirmed that attackers behind a recent cybersecurity incident have also stolen…











