Dec 25, 2025Ravie LakshmananData Breach / Financial Crime The encrypted vault backups stolen from the 2022…
Technology
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
Dec 25, 2025Ravie LakshmananVulnerability / Endpoint Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added…
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
Dec 25, 2025Ravie LakshmananVulnerability / Enterprise Security Fortinet on Wednesday said it observed “recent abuse” of…
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
Dec 24, 2025Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have discovered a new variant of a…
Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
Dec 24, 2025Ravie LakshmananOnline Fraud / Artificial Intelligence The fraudulent investment scheme known as Nomani has…
3 Ways to Protect Your Business in 2026
Dec 24, 2025The Hacker NewsPassword Management / Access Control Every year, cybercriminals find new ways to…
SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips
Dec 24, 2025Ravie LakshmananArtificial Intelligence / Cryptocurrency The U.S. Securities and Exchange Commission (SEC) has filed…
Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition
Dec 24, 2025Ravie LakshmananPrivacy / Antitrust Apple has been fined €98.6 million ($116 million) by Italy’s…
Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances
Dec 23, 2025Ravie LakshmananVulnerability / Workflow Automation A critical security vulnerability has been disclosed in the…
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by…