Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises
Google has made a big step forward by extending end-to-end encryption to Android and iOS devices for Gmail client-side encryption (CSE) users, says an expert...
Aggregating 3062 articles from trusted cybersecurity sources
Google has made a big step forward by extending end-to-end encryption to Android and iOS devices for Gmail client-side encryption (CSE) users, says an expert...
Regulation is hard: The South Pacific Regional Fisheries Management Organization (SPRFMO) oversees fishing across roughly 59 million square kilometers (22 mi...
The Federal Communications Commission has unveiled a proposed rule pushing for more stringent anti-robocall measures on top of already available know your cu...
The U.S.
Cybernews reports that Serasa Experian, the Brazilian subsidiary of credit risk and fraud prevention firm Experian, had 1.8 TB of data belonging to 223 milli...
Android banking trojan linked to Cambodia scam compounds uses forced labour to target users in 21 countries, bypassing security to steal funds.
Popular third-party Android software development kit EngageLab SDK has been impacted by an already addressed intent redirection flaw, which could have been e...
Attacks with the nascent notnullOSX malware for macOS have been targeting cryptocurrency wallets containing over $10,000 in Taiwan, Vietnam, and Spain as par...
Advanced STX RAT sets sights on financial services industry Infosecurity Magazine reports that highly sophisticated tactics have been employed to covertly de...
North Korea had one of its IT worker scams' secrets unravel after a hacker inadvertently executed information-stealing malware on their own computer, accordi...
Almost 3,900, or nearly 75%, of 5,219 internet-exposed Rockwell Automation/Allen-Bradley programmable logic controllers used in critical infrastructure entit...
China-based actor Storm-1175 runs fast ransomware attacks, exploiting new flaws to breach systems and quickly deploy Medusa ransomware. China-based actor Sto...
The Education Authority (EA), which oversees school support services in Northern Ireland, said in an official statement it became aware of the incident affec...
When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of a Data Breach Report puts the ...
Hackers are abusing a critical React2Shell vulnerability in Next.js applications to run an automated credential‑theft operation that has already compromised ...
A researcher leaked the unpatched Windows zero-day “BlueHammer,” letting attackers gain SYSTEM rights; no patch exists yet. A disgruntled researcher released...
Hims & Hers, a telehealth company, has disclosed a data breach involving its third-party customer support ticketing system after hackers gained access betwee...
The high-end casino and hotel operator has likely paid a ransom to avoid a data leak. The post Wynn Resorts Says 21,000 Employees Affected by ShinyHunters Ha...
Nearly 3,500 museums, monuments, and cultural sites across Europe had their online reservations disrupted following a cyberattack against online ticketing pl...
Cybernews reports that Adobe was noted by International Cyber Digest analysts to have had 13 million support tickets with personal information and 15,000 emp...
T-Mobile has explained that only a single account had been compromised in a recent insider breach amid uncertainty that the '1' individual noted to be affect...
Microsoft said it has been alarmed to see how effective Medusa actors are, citing multiple cases where the group can move from initial access to data exfiltr...
The cyberattack occurred on March 27, with the party confirming a network compromise shortly after. While Die Linke stated that its membership database was n...