India's railway system will require Aadhaar-based authentication for all Tatkal (last-minute) train ticket bookings starting July 1, marking a significant expansion of the controversial biometric ID s...

India's railway system will require Aadhaar-based authentication for all Tatkal (last-minute) train ticket bookings starting July 1, marking a significant expansion of the controversial biometric ID s...
French cybersecurity firm WALLIX is strengthening its position as a leading provider of Identity and Access Management (IAM) solutions for Europe's healthcare sector. As cyberattacks targeting medical...
French authorities have conducted coordinated raids leading to the arrest of four young individuals suspected of operating BreachForums, one of the world's largest underground marketplaces for stolen ...
A significant data breach at Ontario Health atHome has potentially compromised sensitive medical information of approximately 200,000 home care patients. The breach, undisclosed until recently, may ha...
A ransomware attack by Russian group Qilin against London's NHS hospitals has resulted in the first confirmed patient death linked to cyber disruption. The attack crippled blood test processing and de...
Kai West, the alleged operator behind the notorious 'IntelBroker' hacker persona, has been charged in the U.S. for orchestrating a global cybercrime network responsible for over $25 million in damages...
German researchers have uncovered a critical vulnerability in Airoha Bluetooth chips used by major headphone brands including Sony, JBL, and Bose. The flaw allows attackers to remotely eavesdrop on co...
Crypto Blockchain Industries (CBI) has announced a non-dilutive shareholder current account advance of up to β¬20 million to acquire Bitcoin and servers, signaling a strong commitment to cryptocurren...
Amazon Web Services faces a pivotal moment as its generative AI leader departs amid intensifying global competition for AI talent. This leadership change at AWS comes as cloud providers grapple with t...
The cybersecurity landscape has witnessed an unprecedented DDoS attack, peaking at 37.4TB of traffic in just 45 seconds - the largest ever recorded. While Cloudflare successfully mitigated this histor...
Enterprise security faces a new challenge with the proliferation of trojanized VPN clients disguised as legitimate applications. Recent warnings from cybersecurity firms highlight how these fake VPN a...
Recent independent audits of major VPN providers reveal significant disparities between privacy claims and actual practices. While services like Surfshark have successfully passed rigorous no-logs pol...
The Godfather Android banking trojan has resurfaced with dangerous new capabilities, including the ability to create isolated virtual instances that perfectly mimic legitimate banking apps. This upgra...
A new cross-platform mobile malware dubbed SparkKitty is targeting cryptocurrency users by stealthily harvesting screenshots containing wallet recovery phrases. The malware operates by scanning device...
North Korean APT group BlueNoroff has been observed deploying a sophisticated macOS malware campaign using fake Zoom applications as lures. The attackers hide malicious scripts over 10,000 lines deep ...
Security researchers have identified the first known malware employing natural language prompt injection to bypass AI-based detection systems. The sophisticated attack attempts to 'convince' AI securi...
Security researchers are sounding alarms as ClickFix malware attacks have surged 517%, making fake error messages the second most abused attack vector. The campaign uses sophisticated social engineeri...
German banking customers are being targeted by an aggressive phishing campaign where attackers impersonate financial institutions to deliver fake security update requests. The emails threaten account ...
A sophisticated phishing campaign impersonating the popular German beer brand Krombacher is spreading via WhatsApp, luring victims with fake giveaways of beer-filled coolers. The scam uses high-qualit...
Russian state-sponsored hackers have developed sophisticated social engineering techniques to bypass Gmail's two-factor authentication (2FA), specifically targeting international critics, academics, a...