-
Mobile
Google is indexing the phone numbers of WhatsApp Users
A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns. Google is…
-
IoT
New P2P Botnet Targeting IoT Devices
By: Ravie Lakshmanan Cybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild…
-
IoT
IoT Security, Attacks And The Industrial Systems at Risk
IoT Vulnerabilities And Industrial Sector Risks Hackers could target smart manufacturing and other industrial environments with new and unconventional cyber…
-
Web Applications
Magento Based Stores See Biggest Attack Due to 0day flaw
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed…
-
Threat Intelligence
Microsoft to Block Excel Add-ins to Stop Office Exploits
Microsoft plans to add a feature to Office Excel that will make it harder for cyberattackers to exploit the spreadsheet…
-
Threat Intelligence
‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
We imagine that the world’s most successful hackers write their own dangerous code and invest heavily in the technologies they…
-
Cloud Security
Building the Business Case for DevSecOps
“Resistance to change is proportional to how much the future might be altered by any given act.” — Stephen King…
-
Cloud Security
What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
Cloud-first computing has taken the tech world by storm, and for good reason. Cloud native infrastructure gives developers and organizations…
-
Breaches
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Oct 10, 2025Ravie LakshmananVulnerability / Network Security Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical…
