Archer Health Data Leak Exposes 23GB of Medical Records
A large cache of medical and personal information belonging to patients of Archer Health Inc. was left publicly accessible after...
Read more →A large cache of medical and personal information belonging to patients of Archer Health Inc. was left publicly accessible after...
Read more →Sep 26, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have discovered an updated version of a known Apple macOS malware...
Read more →An updated variant of the sophisticated XCSSET macOS malware is monitoring the system clipboard to hijack cryptocurrency transactions, Microsoft warns....
Read more →Nessus Pros Authenticated scanning of internal assets (workstations, network devices). Widely accepted for compliance and audit reporting (e.g., PCI DSS)....
Read more →In late 2024, a new wave of cyber espionage emerged targeting global telecommunications infrastructure. Operating under the moniker Salt Typhoon,...
Read more →A loosely connected cybercrime supergroup is exploiting social engineering to compromise Fortune 100 organizations and government agencies. LAPSUS$, Scattered Spider,...
Read more →Sep 26, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity company watchTowr Labs has disclosed that it has “credible evidence” of active...
Read more →Amazon is part of a coalition focused on ensuring artificial intelligence (AI) datacentres use water as efficiently as possible, amid...
Read more →Microsoft researchers say the long-running XCSSET malware has resurfaced with a new arsenal of tricks aimed at stealing data, persisting...
Read more →Burp Enterprise Pros: Offers granular control and customization to fit the distinct needs of a mature security program. Empowers expert...
Read more →Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet...
Read more →Threat actors recently infiltrated a corporate environment, dumped the AD database file NTDS.dit, and nearly achieved full domain control. AD...
Read more →