Data Breach
-
Read moreA cybercriminal known as Tsar0Byte claims to have breached Nokia's internal network, stealing sensitive data of over 94,500 employees. Learn about the implications and exposed information.
-
Read moreA significant data breach at the Tea dating app has compromised the private data of over 11 million female users, including selfies and IDs. Learn more about this serious privacy violation.
-
Read moreDiscover Shuyal, a newly identified stealer malware targeting 19 browsers, including Tor and Brave. Learn how it extracts sensitive data and poses a significant threat to your security.
-
Read moreLearn about the injection vulnerability in Cisco Identity Services Engine (ISE) that could allow remote code execution. Discover recommended actions to mitigate risks and protect your network.
-
Read moreA single compromised password caused the downfall of KNP Logistics, a 158-year-old company, leaving 730 employees jobless. Learn about the Akira ransomware attack and its implications for UK businesses.
-
Read moreA security breach in Amazon's Q Developer Extension for Visual Studio Code affected nearly one million users. Learn how a hacker injected malicious code and what steps Amazon took to resolve the issue.
-
Read moreA cyber attack by Pakistani hackers on NIT Jamshedpur's official website displayed anti-India sentiments. Learn about the incident, its implications, and the ongoing investigation into the breach.
-
Read moreA new malware campaign targets gamers by promoting fake indie games through YouTube and Discord, installing credential-stealing malware. Learn how this sophisticated attack operates and the variants involved.
-
Posted: July 25, 2025Views: 37Read moreA new malware campaign exploits users' trust in financial institutions by using weaponized LNK files disguised as credit card security emails. Learn how this sophisticated attack operates.
-
Read moreCybersecurity researchers have uncovered a stealth backdoor in WordPress mu-plugins, allowing hackers to maintain persistent admin access. Learn how this malware operates and how to protect your site.