Ingram Micro makes progress on restoring operations following attack
IT service provider Ingram Micro said Monday that it is making progress on restoring its transactional business after a ransomware...
Read more →IT service provider Ingram Micro said Monday that it is making progress on restoring its transactional business after a ransomware...
Read more →Ivanti has identified and resolved three high-severity vulnerabilities in its Endpoint Manager (EPM) software. If exploited, these flaws could enable...
Read more →Ivanti has released critical security updates for its Connect Secure and Policy Secure products, addressing six medium-severity vulnerabilities that could...
Read more →Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Congress must...
Read more →ThreatFabric researchers have identified a sophisticated new campaign by the Anatsa banking trojan specifically targeting mobile banking customers across the...
Read more →Fortinet has disclosed a critical security vulnerability in FortiOS that could allow authenticated attackers to execute arbitrary code through a...
Read more →With PoC exploits for CVE-2025-5777 (aka CitrixBleed 2) now public and reports of active exploitation of the flaw since mid-June,...
Read more →The president of secure messaging app Signal has warned of the security implications of agentic AI, where artificial intelligence (AI)...
Read more →The cybercrime group Scattered Spider’s tactics put a group of roughly 300 major companies at heightened risk of attack, according to...
Read more →Applications are a common intrusion point, but the way attackers gain access, maneuver and create mayhem within and across applications...
Read more →The Anatsa banking trojan has sneaked into Google Play once more via an app posing as a PDF viewer that...
Read more →Fortinet disclosed a significant security flaw in its FortiOS operating system, identified as CVE-2025-24477. This heap-based buffer overflow vulnerability, classified...
Read more →