US government warns of new Iran-linked cyber threats on critical infrastructure
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: U.S. government officials said critical…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: U.S. government officials said critical…
Dive Brief: A data breach at healthcare services firm Episource exposed information from 5.4 million people, according to a report submitted earlier this month to federal…
Every day, analysts lose hours to repetitive tasks like enriching alerts or updating tickets. These are essential, but not exactly the kind of work that…
Cybersecurity spending is rising, but so is the pressure on IT and security teams. Gartner projects that global cybersecurity budgets will climb to $212 billion…
Hackers who appear to be part of the Scattered Spider cybercrime gang have launched attacks on airlines and potentially other industries after moving on from…
A critical and closely watched vulnerability in Citrix NetScaler has reached the early stages of active exploitation, according to a blog post published Friday by Reliaquest. …
Three out of four companies have building management systems vulnerable to hacking or cyberattack, according to a new research paper by Claroty, a cyber-physical systems…
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Food supplier United Natural Foods…
Microsoft plans to roll out key platform upgrades in July in an effort to build greater operational resilience into the Windows platform, following the 2024…
Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Security, privacy and related trust…
Dive Brief: A federal district court judge has given preliminary approval to a proposed $177 million settlement between AT&T and plaintiffs who sued the company…
A critical vulnerability in Citrix Netscaler is raising concerns that hackers will launch a wave of attacks rivaling or even surpassing the exploitation seen during…