资讯

Authorities have successfully disrupted and dismantled the notorious online cybercrime marketplaces know n as Cracked and Nulled, which h ad been operating since 2016. The Justice Department’s ...
Alkem Laboratories Ltd has revealed that its wholly owned subsidiary, Enzene Biosciences, was the target of a cyberattack affecting its U.S. operations, which led to a fraudulent transfer of funds.
This is a textbook example of an unauthenticated arbitrary file upload flaw—one of the most dangerous types of vulnerabilities in web applications. With this level of access, attackers could deface ...
University of Notre Dame Cybersecurity Incident: Industry Context The cyberattack on the University of Notre Dame is not an isolated incident. It reflects a larger trend within the education sector, ...
Lessons learned: Implement MFA: Every access point must be protected with multiple ways of authentication. Prepare for downtime: Create continuity plans that ensure minimum disruption of critical ...
Texas Attorney General Ken Paxton has reached a $1.375 billion settlement with tech giant Google, marking the largest amount ever recovered by a single state in a data privacy lawsuit. This historic ...
A vulnerability in cybersecurity refers to a weakness or flaw in a system, network, application, or even human behavior that attackers can leverage to compromise the security posture. These weaknesses ...
A flaw has been discovered in OpenPGP.js, a widely used JavaScript library for OpenPGP encryption. Tracked as CVE-2025-47934, the vulnerability ...
A zero-day vulnerability in the Linux kernel’s SMB (Server Message Block) implementation, identified as CVE-2025-37899, has been discovered using OpenAI’s powerful language model, o3. The ...
Cloudflare has alerted users of a security vulnerability—tracked as CVE-2025-4366—in the widely used Pingora OSS framework. This vulnerability, a request smuggling flaw, was disco vered by a security ...
Cyble Research and Intelligence Labs (CRIL) highlighted the growing misuse of the Open Graph Spoofing Toolkit, a dangerous tool designed to manipulate Open Graph Protocol metadata to trick users into ...
Versa Networks has patched three vulnerabilities in its Concerto network security and SD-WAN orchestration platform, including one that scored a 10.0, the highest possible severity rating. The Versa ...