UK Parliament Opens Inquiry into Cyber-Resilience
UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the country is the third...
UK lawmakers have launched an inquiry into the cyber-resilience of critical national infrastructure (CNI), claiming the country is the third...
A leading US cybersecurity agency has published a new set of online resources designed to help IT security leaders in the...
In an update to previous reports, Kaspersky’s Global Research and Analysis Team (GReAT) has disclosed new insights into the notorious...
New cybersecurity rules and regulations offer security leaders a great opportunity to elevate their role at their organizations, boosting security...
Leading CISOs have offered best practices for security leaders on how to manage cyber risks effectively during the ISC2 Security...
Ahead of the UK's AI Safety Summit, new research has revealed significant concerns among UK IT professionals regarding the deployment of...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformAffected 1E Platform versions have a Blind SQL Injection vulnerability...
A group of academics has devised a novel side-channel attack dubbed iLeakage that exploits a weakness in the A- and...
Cloudflare on Thursday said it mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks that exploited a recently disclosed flaw...
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as a...
While cyberattacks on websites receive much attention, there are often unaddressed risks that can lead to businesses facing lawsuits and...
Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being urged to update to the latest...
The Iranian threat actor known as Tortoiseshell has been attributed to a new wave of watering hole attacks that are...
A relatively new threat actor known as YoroTrooper is likely made of operators originating from Kazakhstan. The assessment, which comes...
VMware issued security updates to fix a critical vCenter Server vulnerability that can be exploited to gain remote code execution attacks...
The Winter Vivern Russian hacking group has been exploiting a Roundcube Webmail zero-day in attacks targeting European government entities and...
As the world moves steadily to becoming more and more digital, organizations worldwide become increasingly dependent on IT systems to...
Chile's Grupo GTD warns that a cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting online services. Grupo...
Security researchers hacked the Samsung Galaxy S23 smartphone two more times on the second day of the Pwn2Own 2023 hacking...
A custom Flipper Zero firmware called 'Xtreme' has added a new feature to perform Bluetooth spam attacks on Android and...
A proof-of-concept (PoC) exploit is released for the 'Citrix Bleed' vulnerability, tracked as CVE-2023-4966, that allows attackers to retrieve authentication...
Japanese watchmaker Seiko has confirmed it suffered a Black Cat ransomware attack earlier this year, warning that the incident has...
Nearly three-quarters (73%) of US small business owners reported a cyber-attack last year, with employee and customer data most likely...
Artificial intelligence (AI) adoption has skyrocketed in 2023 and some fear that this will make some jobs obsolete, but ISACA...