Supply Chain Threats Evolve In 2024
Physical and software supply chain risks make up an increasingly large part of the threat landscape. Here are the evolving risks – and solutions. The…
Physical and software supply chain risks make up an increasingly large part of the threat landscape. Here are the evolving risks – and solutions. The…
Dec 27, 2024Ravie LakshmananVulnerability / Software Security The Apache Software Foundation (ASF) has released patches to address a maximum severity vulnerability in the MINA Java…
American Addiction Centers (AAC) has announced that nearly half a million individuals had their personal and health-related information exposed following a cyberattack in September 2024.…
The authorities of India have issued an urgent warning to citizens regarding the circulation of counterfeit emails impersonating the CEO of the Indian Cyber Crime…
In recent weeks, the landscape of online espionage has shifted dramatically. For years, Western governments and companies have openly accused China of orchestrating cyber attacks…
In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the growing threat of deepfake-related fraud and its impact on financial…
In 2025, seven trends will shape the future of data and AI, offering advantages for those who see these changes not as challenges but as…
IN THIS ARTICLE: Hackers’ Claims: IntelBroker released a second batch of extracted Cisco data, amounting to 4.84 GB, from the October 2024 breach, claiming it…
A U.S. national survey of first responders reveals strong support for AI adoption, cybersecurity concerns, and increasing demand for cloud-native, data-driven, and interoperable CAD and…
Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, Cato Networks, Datadog, Fortinet, GitGuardian, Horizon3.ai, Netwrix, Radiant Logic,…
Palo Alto Networks has disclosed a high-severity vulnerability, CVE-2024-3393, in its PAN-OS software that powers its next-generation firewalls. The flaw allows unauthenticated attackers to exploit…
A surge in cyberattacks leveraging legacy vulnerabilities in D-Link routers has been detected, with two botnets, FICORA and CAPSAICIN, actively exploiting these weaknesses. Researchers at…