Ericsson US discloses data breach after service provider hack
Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and…
Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and…
A convincing fake website posing as the popular Mac utility CleanMyMac is actively pushing dangerous macOS malware called SHub Stealer onto unsuspecting users. The site,…
Insurance Australia Group (IAG) has started working on ways to make its software engineering functions more AI driven, beginning with the way it builds and…
The Rising Threat of Autonomous Cyber Attacks in 2026 In recent years, the integration of artificial intelligence (AI) into malicious activities has significantly evolved, leading…
Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Inconsistent definitions, overly burdensome information…
Between late 2024 and early 2025, the United States government issued indictments or sanctions against three Chinese information security firms – i-SOON, Sichuan Silence, and…
The Iranian advanced persistent threat group known as Seedworm — also tracked as MuddyWater, Temp Zagros, and Static Kitten — has been found actively operating…
Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan (RAT) and steal sensitive data…
The UK government has announced the formation of a new Online Crime Centre – which will commence operations in April – to form a nexus…
CISA ultimately stepped in at the last minute, issuing an emergency 11-month contract extension that kept the system running but left the global security community…
What is Physical Security Intelligence? When most people think of physical security, they often think about access control measures or physical security systems. These include…
In the world of Security Operations Centers (SOCs), data is valuable, but excessive data can be problematic. Collecting every single event from every endpoint is…