Hacker steals record $1.46 billion from Bybit ETH cold wallet
Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one...
Hacker steals over $1.46 billion of crypto from Bybit ETH cold wallet
Cryptocurrency exchange Bybit revealed today that an unknown attacker stole over $1.46 billion worth of cryptocurrency from one...
Product Recall: Stokke® YOYO 3 Pram (2410-0182)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Safety Report: Allereya Necklace and Earrings sold via Amazon (2502-0004)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Recall: Balmonds Gentle Face Wash (2502-0081)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Safety Report: Igloo 90-Quart Flip & Tow Coolers (2502-0086)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect...
Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers...
CISA flags Craft CMS code injection flaw as exploited in attacks
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns that a Craft CMS remote code execution flaw is...
Apple pulls iCloud end-to-end encryption feature in the UK
Apple will no longer offer iCloud end-to-end encryption in the United Kingdom after the government requested a backdoor...
Apple pulls data protection tool after UK government security row
There has been a fierce backlash to the request from privacy campaigners and US politicians. Source:: BBC News...
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows...
Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can...
AI-Powered Deception is a Menace to Our Societies
Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to...
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a...
CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity...
What does Jack Ma’s return to the spotlight in China mean?
Analysts say the Alibaba founder’s re-emergence could signal a policy change in Beijing. Source:: BBC News – Technology
Will quantum computers disrupt critical infrastructure?
Quantum computers will be able to crack existing encryption and threaten critical infrastructure. Source:: BBC News – Technology
Apiiro unveils free scanner to detect malicious code merges
Security researchers at Apiiro have released two free, open-source tools designed to detect and block malicious code before...
Black Basta ransomware gang’s internal chat logs leak online
An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging...