Apr 04, 2025Ravie LakshmananVulnerability / Cloud Security
A maximum severity security vulnerability has been disclosed in Apache Parquet's Java Library that, if successfully exploited,...
Apr 04, 2025Ravie LakshmananCritical Infrastructure / Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less than three cyber attacks...
Microsoft is warning of several phishing campaigns that are leveraging tax-related themes to deploy malware and steal credentials.
"These campaigns notably use redirection methods...
The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job seekers in the...
Apr 03, 2025The Hacker News
The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it's also giving cybercriminals...
AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud detection and content personalization to customer service and security operations. Yet, despite...
Apr 03, 2025Ravie LakshmananThreat Intelligence / Mobile Security
Counterfeit versions of popular smartphone models that are sold at reduced prices have been found to...
Apr 03, 2025Ravie LakshmananData Privacy / Vulnerability
Cybersecurity researchers have disclosed details of a new vulnerability impacting Google's Quick Share data transfer utility for...
In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual abuse material (CSAM).
"A...