Cybersecurity
-
Critical Vulnerability Found in Red Hat OpenShift AI Service
Source: The Hacker NewsRead more: Critical Vulnerability Found in Red Hat OpenShift AI ServiceA severe security flaw has been reported in the Red Hat OpenShift AI service, potentially allowing attackers to escalate privileges.…
-
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware
Source: SecurityWeekRead more: Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star MalwareA new threat actor identified as ‘Phantom Taurus’ is reportedly engaging in espionage against various organizations using the Net-Star malware.…
-
Canadian Airline WestJet Says Hackers Stole Customer Data
Source: SecurityWeekRead more: Canadian Airline WestJet Says Hackers Stole Customer DataWestJet has reported a cybersecurity breach resulting in the theft of customer data. The compromised information includes names, contact details,…
-
Vulnerabilities Found in Google’s Gemini AI Raise Security Concerns
Source: Malware BytesRead more: Vulnerabilities Found in Google’s Gemini AI Raise Security ConcernsSecurity researchers discovered multiple vulnerabilities in Google’s Gemini AI assistant that could have exposed user data. Although patched, these flaws…
-
Vulnerabilities Discovered in Google Gemini AI System
Source: Malware BytesRead more: Vulnerabilities Discovered in Google Gemini AI SystemSecurity researchers have identified three vulnerabilities in Google’s Gemini AI assistant, raising concerns about AI tool security. Although patched, these…
-
NIST Publishes Guide for Protecting ICS Against USB-Borne Threats
Source: SecurityWeekRead more: NIST Publishes Guide for Protecting ICS Against USB-Borne ThreatsNIST Special Publication 1334 addresses cybersecurity risks tied to removable media in operational technology (OT) settings. This guide provides practical…
-
2025 Cybersecurity Assessment Report Highlights Critical Gaps
Source: The Hacker NewsRead more: 2025 Cybersecurity Assessment Report Highlights Critical GapsBitdefender’s 2025 Cybersecurity Assessment Report reveals significant issues in the current cyber defense landscape. It highlights a troubling disconnect between…
-
Hackers Exploit Milesight Routers for Smishing Campaign
Source: The Hacker NewsRead more: Hackers Exploit Milesight Routers for Smishing CampaignThreat actors are utilizing Milesight industrial cellular routers to transmit SMS messages in a widespread smishing campaign targeting users in…
-
Descope Raises $35 Million in Seed Round Extension
Source: SecurityWeekRead more: Descope Raises $35 Million in Seed Round ExtensionDescope, an identity and access management provider, has secured $35 million in a seed round extension. The funding will be…
-
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure
Source: SecurityWeekRead more: Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical InfrastructureThe 2025 theme emphasizes the importance of identity management for government entities and SMBs. These organizations play a crucial role…







