Rising Software Vulnerabilities: Average Patch Time Nears Nine Months
In an alarming trend, the average time to fix software vulnerabilities has now reached nearly nine months, according to Veracode’s...
In an alarming trend, the average time to fix software vulnerabilities has now reached nearly nine months, according to Veracode’s...
In 2024, Chinese cyber espionage operations have risen dramatically, with a reported 150% increase according to CrowdStrike's latest findings. Recent...
A significant ransomware incident was reported as DragonForce launched an attack on a prominent Saudi firm, leading to the theft...
Geopolitical tensions have significantly increased advanced persistent threat (APT) incidents and hacktivism in 2024, according to recent findings by Group-IB....
DISA Global Solutions has confirmed a significant data breach affecting the sensitive information of over 3.3 million people involved in...
HaveIBeenPwned (HIBP) has significantly expanded its database, adding 244 million compromised passwords and 284 million email addresses sourced from infostealer...
A recent ransomware attack has resulted in the publication of sensitive patient data from Genea, an IVF clinic, by the...
Signal, the leading end-to-end encrypted messaging app, considers exiting Sweden due to proposed government legislation affecting user privacy. In a...
In today's digital landscape, API-related security issues are a pressing concern, as highlighted by 99% of organizations reporting challenges in...
Deepfake phone scams have become alarmingly prevalent, affecting a quarter of Brits and prompting global concern over fraudulent communications. Global...
In 2024, a staggering 61% of cybercriminals are innovating quickly, deploying new exploit code within just 48 hours of identifying...
The emergence of a new Chinese botnet poses significant threats to the security of Microsoft 365 accounts, easily bypassing Multi-Factor...
Ransomware attacks are increasingly prioritizing data exfiltration instead of encryption, with over 80% of incidents in the last year adopting...
The recent surge in cybersecurity threats highlights how hackers like Silver Fox are infiltrating healthcare networks, risking sensitive patient information....
The Ghostwriter cyber-attack has shifted focus, intensifying efforts against Ukrainian and Belarusian opposition groups using advanced tactics. A new wave...
Multiple vulnerabilities were identified in F5 Products, attacker can exploit this vulnerability to trigger remote code execution, denial of service...
Multiple vulnerabilities were identified in Adobe ColdFusion. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Bybit is offering a 10% reward on recovered funds in its efforts to reclaim $1.4 billion lost in a massive...
A Michigan man has been indicted for wire fraud and identity theft after allegedly acquiring nearly 2,500 stolen login credentials...
Google Cloud has introduced quantum-safe digital signatures within its Cloud Key Management Service (Cloud KMS), ensuring enhanced security against quantum...
A significant XSS vulnerability has emerged in Essential Addons for Elementor, affecting over 2 million WordPress sites and demanding immediate...
The integration of IT and operational technology (OT) is essential for modern manufacturing, but it has also resulted in increased...
Security and consumer rights experts are calling for accountability from the UK government after the alarming removal of end-to-end encryption...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...