India has taken another step toward expanding AI literacy in India with the launch of Kaushal Rath under the national programme Yuva AI for All. Flagged off from India Gate in New Delhi, the mobile ...
Animation giant Walt Disney has agreed to pay a $2.75 million fine and overhaul its privacy practices to settle violation allegations of the California Consumer ...
The European Commission’s preliminary finding that TikTok addictive design breaches the Digital Services Act (DSA) is a huge change in how regulators view social media responsibility, especially when ...
Data accessed in October 2025 went undetected until February, affecting subscribers across the newsletter platform with no evidence of misuse yet identified. Substack disclosed a security breach that ...
The Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog. The vulnerability, identified as ...
CVE-2025-49457 in Zoom Clients exposes users to privilege escalation. Update Zoom to version 6.3.10 to mitigate risks.
NCSC Cyber Security Culture Iceberg The NCSC also offers the “Cyber Security Culture Iceberg” infographic, illustrating the visible and hidden elements that influence behavior. Surface-level ...
A hacker used a popular artificial intelligence chatbot to run a cybercriminal operation that weaponized AI—deploying Claude AI Code not just as a copilot, ...
Apache warns of CVE-2025-55752 and CVE-2025-55754 in Tomcat 9–11, risking remote code execution and console attacks. Urgent updates are strongly advised.
HPE warns of critical CVE-2025-37093 in StoreOnce software. Vulnerability allows remote access. Patch to version 4.3.11 or later urged for all users.
This article talks about what are vulnerabilities, their types & causes, and details how to implement a winning vulnerability management strategy.
Leaking sensitive information to a foreign government, even if it is not officially classified Acting on behalf of a foreign state in ways that endanger Dutch interests Espionage activities aimed at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results