Davos 2025: Digital supply chains at risk as world faces two years of turbulence
The risk of conflict, growing protectionism, tariffs and trade wars, and growing regulation threaten to disrupt the supply chains of...
Read more →The risk of conflict, growing protectionism, tariffs and trade wars, and growing regulation threaten to disrupt the supply chains of...
Read more →Ivanti addressed multiple severe vulnerabilities in its Endpoint Manager (EPM) software, potentially exposing organizations to significant data breaches. The most...
Read more →SUMMARY Cybercriminals are exploiting the California wildfires to launch phishing campaigns. Veriti Research found fake domains like “malibu-firecom” designed to...
Read more →Cisco announced Cisco AI Defense, a pioneering solution to enable and safeguard AI transformation within enterprises. As AI technology advances,...
Read more →Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems...
Read more →A critical vulnerability has been identified in Veeam Backup for Microsoft Azure, specifically referenced as CVE-2025-23082. Discovered during internal testing,...
Read more →Join cybersecurity leader Erwin Eimers from Sumitomo Chemicals Americas to explore how AI-driven Network Detection and Response (NDR) enhances SIEM...
Read more →Jan 16, 2025Ravie LakshmananVulnerability / Endpoint Security Ivanti has rolled out security updates to address several security flaws impacting Avalanche,...
Read more →The European Commission has rolled out a comprehensive plan to fortify the cybersecurity of hospitals and healthcare providers across the...
Read more →As the calendar turns to 2025, cybersecurity professionals are taking stock of key trends in Common Vulnerabilities and Exposures (CVEs)...
Read more →A significant security vulnerability has been identified in the W3 Total Cache plugin for WordPress, affecting all versions up to...
Read more →Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a...
Read more →