Another discovery by security researchers revealed an Elasticsearch server that hosted a database that contained indices with data records of 5 million users and another ...
By
**Note: The content in this article is only for educational purposes and understanding of cybersecurity concepts. It should enable people and organizations to have a ...
By
Secure Mobile Access (SMA) 1000 Series appliances of Sonicwall have reportedly been hunted in the wild with a zero-day. The vulnerability, tagged as CVE-2025-23006, carries ...
By
A new and concerning trend is being observed in ransomware attacks where the threat actors are using email bombing campaigns followed by social engineering tactics ...
By
**Note: The content in this article is only for educational purposes and understanding of cybersecurity concepts. It should enable people and organizations to have a ...
By
A variant of the AISURU botnet called AIRASHI is being deployed on Cambium Networks cnPilot routers, which are then being used to carry out distributed ...
By
In a landmark move to enhance telecom accessibility, security, and empowerment across India, Union Minister of Communications Jyotiraditya Scindia launched the Sanchar-Saathi mobile application on ...
By
In 2019, cybersecurity researchers Mathy Vanhoef and Eyal Ronen disclosed a series of vulnerabilities called Dragonblood Vulnerabilities. This suite of exploits targeted the next-generation Wi-Fi ...
By
Planet Technology’s WGS-804HPT industrial switches, which are widely used in building and home automation systems for various networking applications, have been reported to house critical ...
By
Security researchers unearthed an unprotected server with hundreds of millions of records, holding data from several major brands such as JD.com (a Chinese e-commerce company), ...
By