Google has released emergency updates to patch another Chrome zero-day vulnerability exploited in attacks, marking the fourth such flaw fixed since the start of the year. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
U.S. cyber agencies, the FBI, and NSA issued an urgent warning today about potential cyberattacks from Iranian-affiliated hackers targeting U.S. critical infrastructure. […] Go to Source Author: Lawrence Abrams
The Berlin Commissioner for Data Protection has formally requested Google and Apple to remove the DeepSeek AI application from the application stores due to GDPR violations. […] Go to Source Author: Bill Toulas
Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks. […] Go to Source Author: Sergiu Gatlan
The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack at the third-party organization Radix. […] Go to Source Author: Bill Toulas
The Canadian government has ordered Hikvision’s subsidiary in the country to cease all operations following a review that determined them to pose a national security risk. […] Go to Source Author: Bill Toulas
Microsoft has confirmed a new known issue causing delivery delays for June 2025 Windows security updates due to an incorrect metadata timestamp. […] Go to Source Author: Sergiu Gatlan
Spanish authorities have arrested five individuals in Madrid and the Canary Islands, suspected of laundering $540 million (€460 million) from illegal cryptocurrency investment schemes and defrauding more than 5,000 victims. […] Go to Source Author: Bill Toulas
The Federal Bureau of Investigation (FBI) has warned Americans of cybercriminals impersonating health fraud investigators to steal their sensitive information. […] Go to Source Author: Sergiu Gatlan
Over 1,200 Citrix NetScaler ADC and NetScaler Gateway appliances exposed online are unpatched against a critical vulnerability believed to be actively exploited, allowing threat actors to bypass authentication by hijacking user sessions. […] Go to Source Author: Sergiu Gatlan
