资讯

Australia is facing a troubling uptick in data breaches, with the country recording its highest number of reported incidents this decade. According to the Office of the Australian Information ...
The Nmap Project has officially launched the highly anticipated Nmap 7.96, bringing a wealth of new features, performance upgrades, and bug fixes to the popular network scanning tool. As a fundamental ...
U.S. legislation to criminalize non-consensual intimate images, videos and deepfakes has passed Congress with the overwhelming support of both parties, and even social media companies have voiced ...
Google’s Threat Intelligence Group (GTIG) released its annual analysis of zero-day exploitation, detailing how 2024 saw attackers increasingly target enterprise software and infrastructure over ...
A new vulnerability has been identified in the TP-Link Tapo H200 V1 IoT Smart Hub that could allow attackers to access sensitive information, particularly Wi-Fi credentials. The Computer Emergency ...
What started as an innocent trend—turning selfies into adorable “Studio Ghibli-style AI images”—has now taken a sinister turn. AI-powered tools, once celebrated for artistic creativity, are now being ...
The DragonForce ransomware group claims to be taking over the infrastructure of RansomHub, the largest ransomware group in the last year, Cyble threat intelligence researchers reported in an advisory ...
In a major cybersecurity operation, the UAE government successfully prevented attacks on 634 government and private entities, preventing what could have been a large-scale UAE cyberattack or data leak ...
Morse Corp Inc., a Massachusetts-based defense contractor, has agreed to pay $4.6 million to resolve allegations of cybersecurity fraud under the False Claims Act. The U.S. Department of Justice ...
Singapore will now have access to high-performance, air-gapped, and secure cloud computing, data management, and artificial intelligence (AI) services of Oracle. Singapore’s Ministry of Defence ...
Cyble Research and Intelligence Labs (CRIL) has uncovered a stealthy campaign that uses malicious LNK files disguised as seemingly innocent wallpapers to deliver AsyncRAT—an infamous remote access ...
A new set of critical vulnerabilities has been identified in Contec Health’s CMS8000 Patient Monitor, posing significant cybersecurity and patient safety risks. These vulnerabilities, which have ...