Home

img

Check Point Contest Hacker's Allegations Of Breach.

The Security Provider Responds That All Of The Data Was Obtained Over Time By Focusing On Certain People Rather Than Directly From...

North Korean Hackers Expand Contagious Interview Campai...

North Korean threat actors behind the ongoing Contagious Interview campaign are intensifying their attacks by spreading new malici...

Microsoft Sets New Email Authentication Standards for H...

Microsoft is introducing stricter security measures for high-volume email senders—those sending over 5,000 emails daily—with enfor...

 CERT-UA Uncovers Coordinated Cyber Attacks on Ukrainia...

Ukraine’s Computer Emergency Response Team (CERT-UA) has reported a series of coordinated cyberattacks targeting state administrat...

Microsoft Warns of Tax-Themed Phishing Surge Using QR C...

Microsoft has raised the alarm over a wave of phishing campaigns exploiting tax season themes to spread malware and steal user cre...

 Quick Share for Windows Vulnerability Reopens File Tra...

Cybersecurity experts have uncovered a new vulnerability in Google’s Quick Share utility for Windows, which could be leveraged to ...

SonicWall Firewall Vulnerability CVE-2024-53704 Exploit...

A critical authentication bypass vulnerability, CVE-2024-53704, in SonicWall firewalls has been exploited by cybercriminals to hij...

Critical Cisco AnyConnect VPN Vulnerability Exposes Mer...

Cisco has disclosed a high-severity vulnerability (CVE-2025-20212) affecting its Meraki MX and Z Series devices with AnyConnect VP...

Bec Fraud

Fraud in Bec

ImageRunner Vulnerability in Google Cloud Run Exposed P...

Cybersecurity researchers have unveiled details about a now-patched privilege escalation flaw in Google Cloud Platform (GCP) Cloud...

Israel's Cyber War With Iran Enters New Phase as Attack...

Cyberattacks targeting Israel surged by 24% in 2024, driven primarily by Iran and its proxy militias. However, the nature of these...

North Korean IT Scammers Shift Focus to Europe Amid Tig...

North Korean IT workers are expanding their deceptive employment tactics beyond their usual targets, now seeking job opportunities...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.