New HIPAA Security Rule Released to Strengthen Healthcare Data
The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) has unveiled a Notice of Proposed Rulemaking (NPRM) to…
The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) has unveiled a Notice of Proposed Rulemaking (NPRM) to…
As 2024 concludes, cybersecurity experts are reflecting on an eventful Q4 that witnessed evolving threats and heightened activity in the malware landscape. ANY.RUN, a leading…
German authorities have charged three Russian-German nationals with espionage and sabotage activities aimed at undermining Germany’s military support for Ukraine. The Federal Prosecutor’s Office filed…
A new ransomware strain, dubbed Nitrogen, has emerged as a significant threat over the past four months, targeting organizations across industries including construction, financial services,…
Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs) from memory. This vulnerability underscores…
The year 2024 marked a pivotal moment in the ever-evolving realm of cybersecurity as cyberattacks became more frequent, sophisticated, and disruptive than ever before. With…
A sophisticated hacker group dubbed “EC2 Grouper” has been exploiting AWS tools and compromised credentials to launch attacks on cloud environments. This prolific threat actor…
A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing attackers to execute arbitrary code…
SafeBreach Labs’ researchers unveiled a proof-of-concept (PoC) exploit for a critical vulnerability in Windows Lightweight Directory Access Protocol (LDAP), tracked as CVE-2024-49112. The flaw, disclosed…
Threat actors are always developing new and more effective approaches to system breaches in the perpetually shifting field of cybersecurity. From basic computer viruses to…
In a concerning development for internet security, a new variation of a long-standing cyberattack technique known as “DoubleClickjacking,” has been discovered, threatening the security of…
A massive phishing campaign has compromised at least 35 Google Chrome extensions, collectively used by approximately 2.6 million users, injecting malicious code to steal sensitive…