admin

ReVault flaws let hackers bypass Windows login on Dell laptops

The five critical vulnerabilities were named “ReVault” by Talos, and are found in Broadcom’s ControlVault3 firmware, as well as associated Windows application programming interfaces (APIs) on a range of Dell business laptops. On June 13, Dell disclosed these vulnerabilities impacting Dell Pro, Latitude, and Precision laptop models. ControlVault3 is a hardware-based security module found in…

Read More

Google suffers data breach in ongoing Salesforce data theft attacks

Google is the latest company to suffer a data breach in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group. In June, Google warned that a threat actor they classify as ‘UNC6040′ is targeting companies’ employees in voice phishing (vishing) social engineering attacks to breach Salesforce instances and download customer data….

Read More

KLM confirms a data breach exposing customer info via third-party system,

KLM Airlines (aka KLM Royal Dutch Airlines), a French-Dutch multinational airline, has notified customers about a recent data breach that exposed certain personal details after a third-party system the company relies on was accessed by an unauthorised party. The breach did not affect core systems or more sensitive data, but it still involves information that…

Read More

Cloudera acquires Taikun to bring unified data and AI anywhere

Cloudera has announced its acquisition of Taikun to accelerates the deployment and delivery of the complete Cloudera platform.   This include Data Services and AI anywhere  from the public clouds to on-prem data centers to sovereign and air-gapped environments  all through a unified control plane. As enterprise IT environments become more complex and distributed, the…

Read More

Telecom Cybersecurity draft rules face pushback from Digital firms over scope & costs

The draft of the telecommunciation cybersecurity rules was released on June 24 Several major digital platforms have flagged concerns over the draft Telecom Cybersecurity Rules, 2025, warning that the proposed framework could impose steep compliance costs and introduce regulatory ambiguities that outweigh the intended benefits. The rules impose additional obligations on any digital platform that uses…

Read More

China says Nvidia must provide ‘security proofs’ to regain trust

Nvidia must produce “convincing security proofs” to eliminate Chinese users’ worries over security risks in its chips and regain market trust, a commentary published by China’s state-run media People’s Daily said on Friday. Foreign companies must comply with Chinese laws and take security to be a basic prerequisite, said the commentary – titled “Nvidia, how can…

Read More

Zscaler’s Annual ThreatLabz Report Reveals Key Ransomware Groups Stole 238 TB of Data in One Year

Key Findings: Ransomware attacks blocked by the Zscaler cloud rose 146%, the sharpest spike observed in the past three years. Public extortion cases jumped by 70% based on data leak site analysis. Data exfiltration volumes increased 92%. Manufacturing, Technology, and Healthcare were the top targeted industries, and the Oil & Gas sector experienced a 935% increase…

Read More

NTT DATA and Mistral AI to Shape Future of Sustainable & Secure Private AI for Enterprises

NTT DATA and Mistral AI to Shape Future of Sustainable and Secure Private AI for Enterprises NTT DATA and Mistral AI, a rising innovator in open-weight, high-performance generative AI (GenAI) models, announced plans to jointly sell and deploy safe and private enterprise-grade AI solutions that are able to foster strategic autonomy for clients. The companies…

Read More