How black boxes became key to solving airplane crashes

After the search for survivors and recovery of victims in tragic aviation accidents — like that of a UPS cargo plane shortly after takeoff from Louisville Muhammad Ali International Airport in Kentucky last month — comes the search for flight data and a cockpit voice recorder often called the “black box.” Every commercial plane has them. Aerospace giants […]

Continue Reading

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

Nov 30, 2025Ravie LakshmananHacktivism / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions […]

Continue Reading

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Nov 28, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the “vulnerability” in bootstrap files provided by a […]

Continue Reading

Sennheiser HDB 630 Wireless Headphones Launched in India With Up to 60 Hours of Battery Life: Price, Features

Sennheiser has launched the HDB 630 wireless headphones in India, offering high-resolution audio, advanced tuning tools and up to 60 hours of battery life. Priced at Rs. 54,990, the model is available at a pre-booking price of Rs. 44,990 with bundled Accentum Open earbuds. The HDB 630 features a 42mm transducer, Bluetooth 5.2, adaptive noise […]

Continue Reading

Why Organizations Are Turning to RPAM

Nov 28, 2025The Hacker NewsEnterprise Security / Threat Detection As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT administrators, contractors and third-party vendors now require secure access to critical systems from any location and […]

Continue Reading