ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
Jun 17, 2024NewsroomRouter Security / Vulnerability ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by…
Jun 17, 2024NewsroomRouter Security / Vulnerability ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by…
A 22-year-old British national allegedly linked to the Scattered Spider hacking group and responsible for attacks on 45 U.S. companies has been arrested in Palma…
Metomic launched its new integration with Google Groups. The feature enables IT and security teams to ensure data loss prevention (DLP) across all business units…
This week on TCE Cyberwatch, we report on significant breaches affecting both prominent companies and universities, with thousands of individuals impacted. In addition, TCE Cyberwatch…
LA County’s Department of Public Health (DPH) data breach impacted over 200,000 individuals Pierluigi Paganini June 17, 2024 The County of Los Angeles’ Department of…
A ransomware cyber attack targeted Synnovis, a pathology laboratory that processes blood tests for several NHS organizations, primarily in southeast London. The attack has significantly…
17 Jun Help Wanted: Women In Cybersecurity Posted at 08:55h in Blogs by Di Freeze This week in cybersecurity from the editors at Cybercrime Magazine…
Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The message warns of a problem…
By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes centuries in order to deliver…
Jun 17, 2024NewsroomCyber Espionage / Vulnerability A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed organization located…
Traditional incident response (IR) processes, honed for on-premises environments, face significant challenges when applied to the cloud. The shared responsibility model of cloud environments demands…
Cybersecurity researcher Jeremiah Fowler discovered a non-password-protected database containing 474,651 images belonging to Total Fitness, a health club chain with 15 locations across North England…