Dec 02, 2025Ravie LakshmananRegulatory Compliance / Online Safety India’s Department of Telecommunications (DoT) has issued directions to...
[email protected] The Hacker News
Dec 02, 2025The Hacker NewsIdentity Theft / Threat Intelligence A joint investigation led by Mauro Eldritch, founder...
Dec 02, 2025Ravie LakshmananMalware / Blockchain The supply chain campaign known as GlassWorm has once again reared...
Dec 02, 2025Ravie LakshmananAI Security / Software Supply Chain Cybersecurity researchers have disclosed details of an npm...
Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the...
Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software...
Dec 02, 2025Ravie LakshmananMobile Security / Vulnerability Google on Monday released monthly security updates for the Android...
Dec 01, 2025Ravie LakshmananSurveillance / National Security India’s telecommunications ministry has reportedly asked major mobile device manufacturers...
A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has...
Dec 01, 2025Ravie LakshmananHacking News / Cybersecurity Hackers aren’t kicking down the door anymore. They just use...