More than 20 CrowdStrike NPM packages were among nearly 200 NPM packages hit by a sophisticated supply chain attack. The compromised packages were quickly removed and CrowdStrike said its Falcon ...
The Jaguar Land Rover cyberattack that has shuttered production lines since September 1 will extend for at least another week, and some observers warn that the effects could linger well beyond then.
Microsoft and Cloudflare dealt a major blow against RaccoonO365, a subscription-based phishing-as-a-service (PhaaS) platform that has fueled thousands of credential theft campaigns since mid-2024. In ...
What is Freenet? Freenet is really cool software that is designed to enable anonymous communication on the internet by employing a decentralized and distributed network architecture. Freenet has been ...
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
Suraksha Catalyst, in collaboration with The Cyber Express, will be launching an on-site podcast series broadcast live from Black Hat USA 2025.
AI as a National Security Vulnerability At the heart of the “ No Adversarial AI Act ” is the recognition that AI, while transformative, can also be a potent tool for espionage and subversion when ...
Microsoft Patch Tuesday July 2025 was the busiest since January, with 130 vulnerabilities fixed - including 17 high-risk ones.
Exposed data on open S3 bucket (Source: Cyble) Icons and branding closely mirrored those institutions to deceive victims into trusting the phishing sites. Attribution and Indicators Several artifacts ...
To fight against cybercrime, Japan’s National Police Agency (NPA) has released a free decryption tool for victims of the Phobos and 8Base ransomware variants. The decryptor, made publicly available in ...
HPE warns of critical CVE-2025-37093 in StoreOnce software. Vulnerability allows remote access. Patch to version 4.3.11 or later urged for all users.
IntelBroker, a shadowy figure in the cybersecurity world, has gained notoriety for a string of high-profile cyberattacks and subsequent data leaks targeting a diverse range of organizations, spanning ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results