fp-1b
-
Join us in celebrating 34 years of Linux! Discover its journey from a hobby project to a powerhouse in computing, powering smartphones, supercomputers, and more.
-
The Indian government has introduced a new policy for secure sharing of transport data through the National Transport Repository. Learn about the guidelines, affected platforms, and privacy measures.
-
Apple has released critical updates to address CVE-2025-43300, a zero-day vulnerability affecting iOS, iPadOS, and macOS. Learn about the impact, affected devices, and how to stay secure.
-
Discover PhantomCard, a sophisticated NFC-based Trojan targeting banking customers in Brazil. Learn how this malware exploits NFC relay attacks to steal sensitive card data and facilitate unauthorized transactions.
-
Learn about the emerging ghost-tapping technique that exploits stolen payment card details linked to Apple Pay and Google Pay. Discover how this method facilitates retail fraud and the impact on users.
-
Discover how the new GodRAT malware, derived from the Gh0st RAT codebase, infiltrates financial institutions using malicious screensaver and program files. Learn about its evolution and impact on security.
-
A critical vulnerability in Microsoft’s Copilot for M365 has allowed unauthorized access to sensitive files without leaving a trace in audit logs. Learn about the implications for organizations and the lack of transparency from Microsoft.
-
Allianz Life confirms a major data breach affecting 1.1 million customers. Learn about the stolen information, the hacking group behind the attack, and the risks of identity theft.
-
Learn about the critical WinRAR vulnerability (CVE-2025-8088) that allows attackers to hijack extraction processes. Discover the importance of applying the security patch before September 2, 2025.
-
Discover how four employees of a Hinjewadi IT firm were charged with stealing confidential data, leading to ₹82 crore in losses. Learn about the implications for cybersecurity in the IT sector.