US politicians ponder Wimwig cyber intel sharing law
A long-awaited update to the US’s Cybersecurity Information Sharing Act (CISA) of 2015 – which lapses at the end of September amid gathering concerns over…
A long-awaited update to the US’s Cybersecurity Information Sharing Act (CISA) of 2015 – which lapses at the end of September amid gathering concerns over…
Marriott International is executing a multiyear digital and technology transformation plan that aims to retool the company, replace systems and develop a cloud-native innovation fabric…
Wealthsimple, a leading Canadian online investment management service, has disclosed a data breach after attackers stole the personal data of an undisclosed number of customers…
A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows Character Map application as an…
The adage “content is king” holds particularly true for the entertainment industry. Millions of people across the globe pursue film, video streaming and musical content, making…
A critical security flaw in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited by attackers, according to research from SecurityBridge. The vulnerability, which carries…
The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. “Available in both…
Jaguar Land Rover (JLR) has told its car workers to stay away from the assembly lines until at least Tuesday, as a possible culprit for…
Microsoft announced that starting this Thursday, all college students in the United States can get a free year of Microsoft 365 Personal. For everyone else,…
Cybercriminals are increasingly exploiting the trust organizations place in artificial intelligence platforms to conduct sophisticated phishing attacks, according to a new report from cybersecurity firm…
A marked escalation in the abuse of ConnectWise ScreenConnect installers since March 2025, with U.S.-based businesses bearing the brunt of these incursions. Adversaries are now…
A critical SAP S/4HANA code injection vulnerability is being leveraged in attacks in the wild to breach exposed servers, researchers warn. The flaw, tracked as CVE-2025-42957,…