DeepSeek Under Fire for Transmitting Sensitive Data Without Encryption
A recent security audit of the popular DeepSeek mobile application for Apple iOS has uncovered severe vulnerabilities that pose significant […]
A recent security audit of the popular DeepSeek mobile application for Apple iOS has uncovered severe vulnerabilities that pose significant […]
Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory regarding an actively exploited security vulnerability in Trimble Cityworks,
Veeam has released security patches to fix a critical vulnerability in its Backup software that could allow attackers to execute
Indian multinational tech giant Tata Technologies has suffered a ransomware attack that temporarily disrupted its IT services. The company, a
Meta-owned WhatsApp has revealed a sophisticated cyberespionage campaign that deployed spyware against nearly 90 journalists and civil society members. The
Cybersecurity researchers have uncovered a critical vulnerability in the Lightning AI Studio development platform that could have enabled remote code
DeepSeek, a Chinese artificial intelligence (AI) startup that has rapidly gained global recognition, has announced temporary restrictions on new user
Ransomware groups are increasingly targeting VMware ESXi hypervisors using SSH tunneling to maintain persistence and evade detection. This method poses
Juniper Networks, a key provider of enterprise-grade networking solutions, has become the focal point of a sophisticated cyber campaign labeled
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a medium-severity cross-site scripting (XSS) vulnerability, CVE-2020-11023, to its
An in-depth evaluation of three firewall models from Palo Alto Networks has exposed significant vulnerabilities, ranging from Secure Boot bypass
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about three critical vulnerabilities impacting Mitel MiCollab and
The Indian government has unveiled a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation, signaling
A proof-of-concept (PoC) exploit, codenamed LDAPNightmare, has been unveiled for a now-patched security vulnerability in Windows’ Lightweight Directory Access Protocol