Indian government agencies, academic institutions, and strategic organizations are under a new wave of cyberattacks attributed to the threat actor Transparent Tribe, also known as APT36....
Cybersecurity is entering an era where the line between everyday technology and malicious activity is increasingly blurred. Threat actors are no longer just infiltrating systems—they are...
Google has released its December 2025 Android security update, confirming that two of the vulnerabilities patched this month were actively exploited in limited, targeted attacks. The...
The French Football Federation (FFF) has confirmed that it suffered a cyberattack resulting in the theft of personal information from its member database. The breach, disclosed...
Cybersecurity researchers have uncovered a large-scale spam campaign that has inundated the npm registry with over 46,000 fake packages since early 2024, in what appears to...
Raven (Risk Analysis and Vulnerability Enumeration for CI/CD) is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities...
Data breaches are a dime a dozen. Although it’s easy to look at that statement negatively, the positive viewpoint is that, as a result, cybersecurity professionals...
72% of banks and credit unions are prioritizing compliance when evaluating fintechs, citing it as their top criteria in the due diligence process, according to Ncontracts. As banks...
Enterprises that leverage observability increase operational efficiency and grow revenue, according to SolarWinds. The report explores how enterprises can act proactively to maximise the advantages of their observability...
60% of cyberattacks against the industrial sector are led by state-affiliated actors and often unintentionally enabled by internal personnel (about 33% of the time), according to Rockwell Automation....
Recent Comments