European cloud providers unite over data sovereignty-focused API
European cloud providers are being urged to adopt a newly created open source infrastructure management application programming interface (API) designed to make it easier for…
European cloud providers are being urged to adopt a newly created open source infrastructure management application programming interface (API) designed to make it easier for…
Starting mid-March 2025, Microsoft will start prompting users of its Microsoft 365 apps for Windows to back up their files to OneDrive. These prompts will…
With recent attack disclosures like Browser Syncjacking and extension infostealers, browser extensions have become a primary security concern at many organizations. SquareX’s research team discovers…
The National Health Service (NHS) has long been plagued by cybersecurity controversies, with one of the most notable incidents being the 2017 WannaCry ransomware attack…
Securing Active Directory (AD) is a critical priority for organizations. Misconfigurations in AD, such as excessive permissions, outdated protocols, or unprotected service accounts, are common…
In a major coordinated operation, several U.S. law enforcement agencies have charged 12 Chinese nationals with a series of cyber attacks affecting government bodies, religious…
MillionPodcasts, who calls itself the ultimate destination for podcast media contacts, recently released a list of the best 100 cybercrime podcasts. The Cybercrime Magazine Podcast, listed at…
Removing 24 malicious apps from the Google Play store and silencing some servers almost halved a botnet known as BadBox. The BadBox botnet focuses on…
Mar 06, 2025Ravie LakshmananThreat Intelligence / Vulnerability The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January…
Dive Brief: Cyberattacks targeting third-party vendors are causing more financial damage than ever before, cyber risk management firm Resilience said in a recent report. Nearly…
A newly devised “polymorphic” attack allows malicious Chrome extensions to morph into browser extensions, including password managers, crypto wallets, and banking apps, to steal sensitive information.…
Security researchers at SEC Consult have discovered a significant vulnerability in CrowdStrike’s Falcon Sensor that allowed attackers to bypass detection mechanisms and execute malicious applications.…