Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations
Wed, 30 Apr 2025 10:15:00 +0530
WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy
Tue, 29 Apr 2025 22:52:00 +0530
New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
Tue, 29 Apr 2025 21:48:00 +0530
SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients
Tue, 29 Apr 2025 18:37:00 +0530
Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
Tue, 29 Apr 2025 15:41:00 +0530
Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
Tue, 29 Apr 2025 11:13:00 +0530
CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database
Tue, 29 Apr 2025 09:51:00 +0530
⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More
Mon, 28 Apr 2025 17:48:00 +0530
Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools
Mon, 28 Apr 2025 14:37:00 +0530
WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors
Mon, 28 Apr 2025 13:36:00 +0530
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Mon, 28 Apr 2025 12:43:00 +0530
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
Sun, 27 Apr 2025 10:32:00 +0530
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Sat, 26 Apr 2025 16:08:00 +0530
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
Fri, 25 Apr 2025 19:35:00 +0530
New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework
Fri, 25 Apr 2025 16:11:00 +0530
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Fri, 25 Apr 2025 14:27:00 +0530
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Fri, 25 Apr 2025 14:13:00 +0530
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware
Thu, 24 Apr 2025 19:41:00 +0530
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
Thu, 24 Apr 2025 18:28:00 +0530
Thu, 24 Apr 2025 18:26:00 +0530
Share this story
Unlock exclusive updates and special offers! Fill out our contact form to stay connected and be the first to know.