Poland’s Ministry of Digital Affairs submitted a formal request to the European Commission, this week, demanding investigation of TikTok for allegedly failing to moderate a large-scale disinformation ...
The cybersecurity world is facing a “Heartbleed” moment for the NoSQL era. A critical vulnerability in MongoDB, the world’s most popular non-relational database, is being actively exploited in the ...
Spotify has disabled multiple user accounts after an open-source group claimed it scraped millions of songs and related data from the music streaming platform. The move comes after Anna’s Archive ...
Cybersecurity for businesses in 2025: Explore trends, emerging threats, and how to safeguard your business from evolving digital risks.
The Cyberspace Administration of China has summoned Nvidia over security risks tied to Nvidia H20 chips, amid escalating U.S.-China tensions.
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
Conclusion The recently disclosed VMware Tools vulnerability (CVE-2025-22247) affects versions 11.x.x and 12.x.x on both Windows and Linux platforms, with macOS remaining unaffected. With a CVSS score ...
The Aflac breach is the latest cyberattack against the insurance industry. Aflac didn't name the threat actor but Scattered Spider has been targeting the sector ...
The vulnerability exists in RadiAnt DICOM Viewer (Version 2024.02) due to improper certificate validation (CWE-295).
Amidst the ongoing Israel-Palestine conflict, a surge of hacktivists and ransomware groups has entered the arena, declaring a relentless wave of cyberattacks targeting both governmental and private ...
Apache warns of CVE-2025-55752 and CVE-2025-55754 in Tomcat 9–11, risking remote code execution and console attacks. Urgent updates are strongly advised.
Embedded SIMs (eSIMs), officially known as Kigen eUICC, are transforming connectivity by allowing users to switch operators without physically swapping ...