Disgruntled ex-employee sabotages company systems with malicious code, causing major disruptions and financial losses. Learn about the case and the…
A secret tribunal is due to meet at the High Court in London this week to hear tech giant Apple…
Dive Brief: About six of every 10 ransomware claims in 2024 involved the compromise of a perimeter security device such…
Microsoft announced that it will drop support for the Remote Desktop app (available via the Microsoft Store) on May 27…
Jaguar Land Rover Data Breach Exposes Sensitive Information Jaguar Land Rover (JLR), one of the world’s premier luxury car manufacturers,…
As AI technology advances, cybercriminals create more personalized and convincing scams. This includes mimicking voices, deepfake videos, and highly convincing…
Compromised or vulnerable perimeter security appliances and devices – especially virtual private networks (VPNs) – formed the initial access vector…
The government is under-prepared for a catastrophic cyber attack and still dogged by legacy IT, but making progress, the Public…
President Donald Trump nominated Sean Plankey to head the Cybersecurity and Infrastructure Security Agency on Tuesday, the last major piece…
Cybercriminals are using AI for help in planning and conducting cyberattacks—but cybersecurity vendors are fighting back. Learn from Acronis Threat…
Allstate and several of the insurance company’s subsidiaries were accused of poor security practices resulting in data breaches in 2020…
Threat intelligence company GreyNoise warns that a critical PHP remote code execution vulnerability that impacts Windows systems is now under…











