ReVault flaws let hackers bypass Windows login on Dell laptops

The five critical vulnerabilities were named “ReVault” by Talos, and are found in Broadcom’s ControlVault3 firmware, as well as associated Windows application programming interfaces (APIs) on a range of Dell business laptops. On June 13, Dell disclosed these vulnerabilities impacting Dell Pro, Latitude, and Precision laptop models. ControlVault3 is a hardware-based security module found in…

Read More

KLM confirms a data breach exposing customer info via third-party system,

KLM Airlines (aka KLM Royal Dutch Airlines), a French-Dutch multinational airline, has notified customers about a recent data breach that exposed certain personal details after a third-party system the company relies on was accessed by an unauthorised party. The breach did not affect core systems or more sensitive data, but it still involves information that…

Read More

China says Nvidia must provide ‘security proofs’ to regain trust

Nvidia must produce “convincing security proofs” to eliminate Chinese users’ worries over security risks in its chips and regain market trust, a commentary published by China’s state-run media People’s Daily said on Friday. Foreign companies must comply with Chinese laws and take security to be a basic prerequisite, said the commentary – titled “Nvidia, how can…

Read More

Zscaler’s Annual ThreatLabz Report Reveals Key Ransomware Groups Stole 238 TB of Data in One Year

Key Findings: Ransomware attacks blocked by the Zscaler cloud rose 146%, the sharpest spike observed in the past three years. Public extortion cases jumped by 70% based on data leak site analysis. Data exfiltration volumes increased 92%. Manufacturing, Technology, and Healthcare were the top targeted industries, and the Oil & Gas sector experienced a 935% increase…

Read More

Cert-mandates annual cybersecurity audit for companies operating in India

Indian Computer Emergency Response Team (Cert-In) has made it mandatory for private and public-sector organisations that own or operate digital systems, processes, or infrastructure, to undergo a comprehensive third-party cybersecurity audit at least once a year.   This is the first such directive for the private sector. The guidelines by Cert-In allow sectoral regulators to…

Read More

Panel in Parliament flags privacy concern in Telecom cyber security norms

A parliamentary panel report tabled in the Rajya Sabha on Thursday flagged privacy concerns on telecom cyber security rules and recommended that the Department of Telecom finetune it. A report on The Telecommunications (Critical Telecommunication Infrastructure) Rules, 2024 and Telecommunications (Telecom Cyber Security) Rules, 2024 by the Committee on Subordinate Legislation observed vague terms in…

Read More

73% of Org’s With up to 2,000 Employees Rely on MSPs to Manage the Security Challenges of Growth; Barracuda Networks

Barracuda Networks, published the MSP Customer Insight Report 2025. The report details the findings of an international survey showing how managed service providers (MSPs) have become critical partners for businesses that want to grow securely. The survey, undertaken by Barracuda with Vanson Bourne, gathered insights from 2,000 IT and security decision makers across the Americas, Europe…

Read More

NETSCOUT EXPANDS AUTOMATED THREAT DETECTION AND RESPONSE CAPABILITIES

NETSCOUT SYSTEMS, recently  announced Adaptive Threat Analytics, a new enhancement to its Omnis Cyber Intelligence Network Detection and Response (NDR) solution, designed to improve incident response and reduce risk. Adaptive Threat Analytics enables security teams to investigate, hunt, and respond to cyber threats more rapidly. Cybersecurity professionals face a challenge in the race against time…

Read More