
Jaguar Land Rover has restarted production after a major cyberattack shutdown. Tata Motors’ unit also secured a £1.5 billion UK…
According to Brussels Airport, the cyberattack forced automated systems offline, leaving staff to handle check-in and boarding manually.
While the Tata Group-owned luxury car brand has confirmed that an investigation is underway, the company has stated that there…
CoinDCX is now the second Indian crypto exchange hit by hackers in one year.
If you’re still reusing passwords or skipping extra security layers, you could be in serious trouble.
The RBI has directed all banks to integrate the Financial Fraud Risk Indicator (FRI) developed by the DoT, to combat…
Various measures are coming into place by government, tech platforms, phone makers, and telecom companies to screen fraud calls.
Goldman Sachs taps Polymarket, a crypto-based prediction platform, to assess Iran conflict risks and oil outlook. With millions wagered on…
With Grand Theft Auto VI (GTA 6) slated for a 2026 debut, cybersecurity analysts are forecasting a surge in malicious…
SEBI will launch a new UPI verification mechanism for secured payments by investors in capital market transactions. ‘SEBI Check’ will…
Apple devices vulnerable to these threats include iPhones running software versions older than iOS 18.3, and iPads using iPadOS versions…
As AI adoption surges, balancing speed with security is crucial. Organisations must embed safety, ethical frameworks, and continuous evaluation into…
On Tuesday, a jury in California ruled that NSO owed Meta $444,719 in compensatory damages – and $167.3 million in…
WhatsApp getting hacked is more common than most users realize, and with over two billion people relying on it for…
The Pakistan Cyber Force claims to have gained access to sensitive data pertaining to defence personnel — including their login…
The incident came amid a week of chaos for Marks and Spencers, marked by a massive loss in sales and…
The interview discusses the increasing cybersecurity risks in modern connected vehicles due to complex software and connectivity, highlighting vulnerabilities in…
These security flaws, if exploited, could allow attackers to execute arbitrary code, bypass security restrictions, steal sensitive information, or launch…