Chess.com discloses recent data breach via file transfer app
Chess.com has disclosed a data breach after threat actors gained unauthorized access to a third-party file transfer application used by...
Read more →Chess.com has disclosed a data breach after threat actors gained unauthorized access to a third-party file transfer application used by...
Read more →Securing the Digital Frontier: How Micro Storage Technology is Rewriting Cybersecurity Protocols The physical security of digital assets has long...
Read more →Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at...
Read more →Cyber security vendor Check Point Software says a recently released AI-powered framework for fast automated testing has quickly become abused...
Read more →Threat actors have been exploiting a zero-day vulnerability in legacy Sitecore deployments to deploy WeepSteel reconnaissance malware. The flaw, tracked...
Read more →Online chess giant Chess.com has disclosed a data breach that compromised the personal information of 4,541 individuals, according to a filing with the...
Read more →The Future of Cyber Resilience The algorithms are hunting us. Not with malicious code, but with something far more insidious....
Read more →Sep 04, 2025Ravie LakshmananCybersecurity / Malware The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new...
Read more →An attacker exploited a zero-day vulnerability in Sitecore stemming from a misconfiguration of public ASP.NET machine keys that customers implemented...
Read more →Texas Attorney General Ken Paxton has filed a lawsuit against education software company PowerSchool, which suffered a massive data breach...
Read more →Securing the Digital Frontier: How AI is Reshaping Application Security The software development landscape is transforming at breakneck speed. Developers...
Read more →Artificial intelligence could be a key tool for helping organizations keep track of an ever-expanding catalog of identified software flaws,...
Read more →