More than 60,000 D-Link network-attached storage devices that have reached end-of-life are vulnerable to a command injection ...
After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also ...
Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models ...
Palo Alto Networks warned customers to restrict access to their next-generation firewalls because of a potential remote code execution vulnerability in the PAN-OS management interface.
Nokia's investigation of recent claims of a data breach found that the source code leaked on a hacker forum belongs to a ...
Hewlett Packard Enterprise (HPE) released updates for Instant AOS-8 and AOS-10 software to address two critical ...
North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS ...
The Canadian government has ordered the dissolution of TikTok Technology Canada following a multi-step review that provided ...
The most recent update to the Google Android app has startled users as they notice the mysterious "search.app" links being generated when sharing content and links from the Google app externally.
A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit card data by using the "bring your own ...
Microsoft has started testing AI-powered Notepad text rewriting and Paint image generation tools four decades after the two ...
Interpol announced it arrested 41 individuals and taken down 1,037 servers and infrastructure running on 22,000 IP addresses ...