Water utilities would get cybersecurity boost under bipartisan Senate bill
Small water and wastewater utilities would get a boost to their cybersecurity defenses under a bipartisan Senate bill that a pair of lawmakers re-introduced Thursday.…
Small water and wastewater utilities would get a boost to their cybersecurity defenses under a bipartisan Senate bill that a pair of lawmakers re-introduced Thursday.…
A Russian-speaking actor using the Telegram handle @ExploitWhispers leaked internal chat logs of Black Basta Ransomware-as-a-Service (RaaS) members on February 11, 2025. These communications, spanning…
Amazon Web Services’ Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and users. While its scalability and…
Malware Impersonating Booking.com Targets Hospitality Sector Microsoft Threat Intelligence researchers have been tracking a cybercriminal group targeting the hospitality industry. Known as Storm-1865, this group…
In this Help Net Security interview, Mir Kashifuddin, Data Risk & Privacy Leader at PwC, discusses how CISOs can translate cyber risk into business value…
Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the…
LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S. Pierluigi Paganini March 14, 2025 The US Justice Department announced that the LockBit…
A dual Russian-Israeli national, suspected of being a key developer for the LockBit ransomware operation, has been extradited to the United States to face charges.…
A hacker operating under the pseudonym “Empire” has allegedly listed a database containing 3,176,958 records from Honda Cars India Ltd for sale on a notorious…
Microsoft researchers have uncovered a surprisingly straightforward method that can bypass safety guardrails in most leading AI systems. In a technical blog post published on…
The Cybersecurity and Infrastructure Security Agency (CISA) has recently issued multiple Industrial Control Systems (ICS) advisories highlighting significant security vulnerabilities across various critical infrastructure sectors. …
The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and Google’s Gemini, has attracted cybercriminals seeking to exploit these technologies for…