Expensive Investigations Drive Surging Data Breach Costs
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
Today, T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile...
Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data...
The average annual cost of insider risk incidents has risen to $16.2m per organization in 2023, up from $15.4m in...
Image: Midjourney The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt...
TikTok is flooded by a surge of fake cryptocurrency giveaways posted to the video-sharing platform, with almost all of the...
A Chinese espionage-focused hacker tracked as 'Earth Lusca' was observed targeting government agencies in multiple countries, using a new Linux...
An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers...
Passwords have long been used as the primary gatekeepers of digital security, yet they can also be a weak link...
The malware loader 'Bumblebee' has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse...
The APT36 hacking group, aka 'Transparent Tribe,' has been observed using at least three Android apps that mimic YouTube to infect...
Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro's Apex One endpoint protection solution that was actively exploited...
New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat...
Scammers are impersonating the bankruptcy claim agent for crypto lender Celsius in phishing attacks that attempt to steal funds from...
GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users...
The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached....
A Chinese-linked threat actor known as ‘Earth Lusca’ has been conducting cyber espionage campaigns against governments around the world via...
This week’s big news is the extortion attacks on the Caesars and MGM Las Vegas casino chains, with one having...
9/15/23 update added below. Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is behind recent service...
Software company Retool says the accounts of 27 cloud customers were compromised following a targeted and multi-stage social engineering attack....
Google has announced the Auto Update Expiration (AUE) date will be extended from 5 years to 10 for all Chromebooks, guaranteeing...