Recent Updates
All Countries
All Countries
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo
Cook Islands
Costa Rica
Croatia (Hrvatska)
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
France, Metropolitan
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Guernsey
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Heard and Mc Donald Islands
Honduras
Hong Kong
Hungary
Iceland
India
Isle of Man
Indonesia
Iran (Islamic Republic of)
Iraq
Ireland
Israel
Italy
Ivory Coast
Jersey
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Kitts and Nevis
Saint Lucia
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia South Sandwich Islands
Spain
Sri Lanka
St. Helena
St. Pierre and Miquelon
Sudan
Suriname
Svalbard and Jan Mayen Islands
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan
Tajikistan
Tanzania, United Republic of
Thailand
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
United States
United States minor outlying islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
Western Sahara
Yemen
Zaire
Zambia
Zimbabwe
-
How to Debloat and Optimise Windows 11 in a Virtual Machine (Clean Setup Guide)Windows 11 includes many background services, consumer features, and visual effects that are unnecessary in a virtual machine environment. If you are running Windows 11 in VirtualBox or VMware for testing, development, browsing, or general use, disabling these extras can significantly improve performance and reduce resource usage. This guide provides a single PowerShell script that...0 Comments 0 Shares 70 Views 0 ReviewsPlease log in to like, share and comment!
-
AI Security Threats: What Every IT Professional Needs to Know in 2026The Evolving AI Threat Landscape As artificial intelligence becomes increasingly integrated into enterprise systems, security professionals face unprecedented challenges. From deepfake attacks to AI-powered malware, the threat landscape is evolving faster than traditional security measures can adapt. Key AI Security Risks 1. AI-Powered Phishing Attacks Machine learning algorithms can now...0 Comments 0 Shares 553 Views 0 Reviews
-
Zero Trust Architecture: Essential Cloud Security for 2026Why Zero Trust is Critical in 2026 Traditional perimeter-based security models have become obsolete in our cloud-first world. With 95% of organizations now using multi-cloud strategies, Zero Trust Architecture (ZTA) has evolved from a concept to a business necessity. Core Zero Trust Principles Never Trust, Always Verify Every user, device, and application must be continuously authenticated...0 Comments 0 Shares 672 Views 0 Reviews
-
DevSecOps Best Practices: Securing the Software Supply Chain in 2026The DevSecOps Imperative With software supply chain attacks increasing 742% in 2025, integrating security into every stage of the development lifecycle has become critical. DevSecOps transforms security from a bottleneck into an enabler of faster, safer deployments. Key DevSecOps Principles Shift-Left Security Security testing begins at the code commit stage, not deployment. Early detection...0 Comments 0 Shares 465 Views 0 Reviews
-
How a Server Vulnerability Led to Crypto Mining on Our InfrastructureLast week, we witnessed a security incident that started as a simple performance issue and evolved into a cryptocurrency mining investigation. Here's how these attacks work and what you need to know to protect your infrastructure from similar threats. The Deceptive Beginning It always starts innocently. Pages load slowly, applications feel sluggish, and users start complaining. Your first...0 Comments 0 Shares 758 Views 0 Reviews
-
Microsoft Patches Actively Exploited Office Vulnerability — Update ImmediatelyMicrosoft has released an urgent security update for a critical vulnerability affecting Microsoft Office, and it’s one users should not ignore. The flaw is already being exploited in real-world attacks, meaning systems that haven’t been updated are actively at risk. What’s the Vulnerability? The issue, tracked as CVE-2026-21509, allows attackers to bypass key Microsoft Office security...0 Comments 0 Shares 751 Views 0 Reviews
-
Google Patches High-Severity WebView Vulnerability (CVE-2026-0628) — Update NowGoogle has released an urgent security update to fix a high-severity vulnerability in the Chrome WebView component, tracked as CVE-2026-0628. This flaw posed a significant threat to devices and applications that use WebView to render web content, including Android apps and certain desktop applications, and could allow attackers to bypass important browser-level security protections. What Is...0 Comments 0 Shares 805 Views 0 Reviews
-
Fortinet Patches Actively Exploited FortiCloud SSO Zero-Day — Urgent Update RequiredFortinet has started rolling out security updates for a critical zero-day vulnerability affecting its FortiOS platform and associated products, after multiple organizations reported real-world attacks that bypass authentication and grant unauthorized administrative access. What Was Happening Reports from customers in late January confirmed that attackers were able to access FortiGate...0 Comments 0 Shares 561 Views 0 Reviews
-
New Osiris Ransomware Uses Advanced Evasion Technique to Bypass Security ToolsSecurity researchers have identified a new ransomware strain called Osiris that employs sophisticated evasion methods to disable endpoint protection before encrypting systems. The malware leverages a technique known as Bring Your Own Vulnerable Driver (BYOVD), allowing attackers to execute malicious code with elevated privileges while circumventing detection by traditional security tools. What...0 Comments 0 Shares 590 Views 0 Reviews
-
What Is Exploit-DB and Why It Matters in CybersecurityExploit-DB is one of the most widely used public databases in the cybersecurity world, yet it is often misunderstood outside of security research circles. Maintained by Offensive Security, Exploit-DB serves as an archive of publicly disclosed exploits and proof-of-concept (PoC) code tied to real vulnerabilities. For defenders, the database is not about learning how to hack systems — it's about...0 Comments 0 Shares 511 Views 0 Reviews
-
Nike Investigates Possible Cybersecurity Breach After Data Theft ClaimsNike has confirmed it is investigating a potential cybersecurity incident following claims by a hacking group that it accessed and exfiltrated internal company data. The incident has not yet been fully verified by independent sources, but Nike acknowledged the situation and stated that an internal investigation is currently underway to determine the scope and impact of the alleged breach....0 Comments 0 Shares 657 Views 0 Reviews
-
Under Armour Investigates Major Data Breach Affecting Millions of CustomersClothing and athletic gear company Under Armour is investigating a significant data breach that reportedly exposed the personal information of millions of its customers. The incident — believed to have occurred in late 2025 — has put the spotlight on data security practices within major global retailers. According to reports, the breach resulted in the unauthorized access and theft of an...0 Comments 0 Shares 565 Views 0 Reviews
-
TikTok Sees Reported 150% Spike in App Uninstalls Amid Privacy and Policy ConcernsTikTok has reportedly experienced a sharp increase in app uninstalls, with new data suggesting deletions have risen by as much as 150% over the past several days, according to market intelligence and analytics reports. The spike follows renewed scrutiny around privacy policies, regulatory pressure, and platform changes, particularly in the United States, where TikTok continues to face...0 Comments 0 Shares 654 Views 0 Reviews
-
Elon Musk’s Grok AI Chatbot Ranks Worst in Countering Antisemitic Content, ADL Study FindsA recent independent study by the Anti-Defamation League (ADL) has found that Elon Musk’s Grok AI chatbot performed worst among major AI language models in detecting and countering antisemitic and extremist content. The report highlights significant gaps in how leading artificial intelligence systems handle harmful speech and bias, particularly in the context of hate and extremist narratives....0 Comments 0 Shares 711 Views 0 Reviews
-
Researchers Find Over 175,000 AI Servers Publicly Exposed WorldwideA new joint investigation by cybersecurity researchers from SentinelOne’s SentinelLABS and Censys has uncovered a staggering number of publicly accessible artificial intelligence servers — raising serious security concerns for organisations and developers deploying AI systems. According to the analysis, researchers discovered more than 175,000 unique Ollama AI servers exposed directly to...0 Comments 0 Shares 716 Views 0 Reviews
More Stories