Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
2 min read
admin
May 10, 2025
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits...
admin
May 10, 2025
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked...
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
4 min read
admin
May 9, 2025
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network...
admin
May 9, 2025
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of...
admin
May 9, 2025
Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions...
admin
May 9, 2025
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better...
admin
May 9, 2025
Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version...
admin
May 9, 2025
The Vulnerability Treadmill
The reactive nature of vulnerability management, combined with delays from policy and process, strains security...
admin
May 9, 2025
Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome,...
admin
May 9, 2025
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in...
admin
May 8, 2025
Cybersecurity researchers have exposed what they say is an "industrial-scale, global cryptocurrency phishing operation" engineered to steal...
admin
May 8, 2025
61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past...
admin
May 8, 2025
The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of...
admin
May 8, 2025
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as...
admin
May 8, 2025
Cisco has released software fixes to address a maximum-severity security flaw in its IOS XE Wireless Controller...
admin
May 7, 2025
Europol has announced the takedown of distributed denial of service (DDoS)-for-hire services that were used to launch...
admin
May 7, 2025
A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come under active exploitation in...
admin
May 7, 2025
Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that...
admin
May 7, 2025
Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and SaaS access....
admin
May 7, 2025
Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft...
