The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility.
The French Prime Minister’s...
North Korean hackers have stolen vital microchip information from South Korean chip makers, according to reports from South Korea’s National Intelligence Service (NIS).
“We believe...
The European Parliament and Council have reached a political agreement on the Cyber Solidarity Act, which was created to enhance the EU’s capabilities to...
Quantum computers can solve complex problems exponentially faster than classical computers and are hailed as the future of computing; however, they are still vulnerable...
Many companies are integrating generative AI tools into their products to reduce the human workload and make hard tasks easier, which is both transformative...
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself.
When choosing whether...
Malicious romance cybercriminal steals close to a quarter million dollars from a victim in a months-long online scam.
This type of online scam is also...
The Remember Me checkbox promises online users a convenient, one-time log in, but using this feature has various security implications. Research released by the...
The expansion of the digital realm into space has opened new frontiers for cyber threats, posing unprecedented challenges.
The satellites orbiting Earth are crucial for...
Hackers can now create clones of WiFi hotspots and intercept data, as well as enable unauthorized access to protected home Wi-Fi networks and expose...
Nowadays, fingerprints are one of the most popular forms of personal identification, whether it’s unlocking your phone, approving online payments, access control, and many...
UK and US law enforcement led an international operation, successfully disrupting the Russian-linked ransomware specialist LockBit, one of the most harmful cybercrime groups in...
MIT developers invent new tamper-proof ID tag that provides cheap and secure authentication – a cryptographic chip that is smaller and cheaper than RFID...
The US Department of Justice claims to have taken down a global botnet controlled by GRU, Russia’s military intelligence agency. The botnet reportedly consisted...