资讯

A flaw has been discovered in OpenPGP.js, a widely used JavaScript library for OpenPGP encryption. Tracked as CVE-2025-47934, the vulnerability ...
Alkem Laboratories Ltd has revealed that its wholly owned subsidiary, Enzene Biosciences, was the target of a cyberattack affecting its U.S. operations, which led to a fraudulent transfer of funds.
A vulnerability in cybersecurity refers to a weakness or flaw in a system, network, application, or even human behavior that attackers can leverage to compromise the security posture. These weaknesses ...
The word “hacking” often brings up images of hooded figures in dark rooms, tapping away at keyboards to steal our identities and drain our bank accounts. But the truth is, hacking is a much broader ...
Ivanti has released security patches to address two vulnerabilities in its Endpoint Manager Mobile (EPMM) software, which were being actively exploited in limited attacks. These vulnerabilities, ...
Carlsbad, California – Encina Wastewater Authority (EWA) found itself targeted by the notorious BlackByte ransomware group. The threat actor, known for its aggressive tactics, posted a message on its ...
VMSA-2025-0007 Advisory Details (Source: Broadcom) Broadcom has confirmed that there are no workarounds for this vulnerability, and updating to a fixed version, VMware Tools 12.5.2, is the only option ...
This is a textbook example of an unauthenticated arbitrary file upload flaw—one of the most dangerous types of vulnerabilities in web applications. With this level of access, attackers could deface ...
The ever-evolving landscape of cybersecurity is shaped by a dedicated group of individuals. These pioneers, through their research, entrepreneurship, and tireless efforts, have left a significant mark ...
In today’s hyper-connected digital world, cyber threats are more prevalent than ever, with cyberattacks occurring every 39 seconds on average, according to a study by the University of Maryland. With ...
The hacking group Dark Storm Team has issued a menacing ultimatum, vowing to unleash a wave of cyberattacks targeting the services and government websites of NATO countries, Israel, and those nations ...
The image that comes to mind when we hear the word “hacker” is often one of a hooded figure hunched over a computer screen, fingers flying across the keyboard, stealing classified information or ...