How Ransomware Jeopardizes Healthcare Organizations
Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector...
Read more →Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector...
Read more →The FSCA’s Joint Standard on Cybersecurity and Cyber Resilience is set to commence in June 2025, putting pressure on South...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited zero-days...
Read more →A sophisticated cyber espionage campaign conducted by a threat actor known as BrazenBamboo. The group is exploiting an unpatched vulnerability...
Read more →A botnet exploits e GeoVision zero-day to compromise EoL devices Pierluigi Paganini November 17, 2024 A botnet employed in DDoS...
Read more →Google’s Gemini AI Chatbot faces backlash after multiple incidents of it telling users to die, raising concerns about AI safety,...
Read more →Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing malware, used to...
Read more →Palo Alto Networks confirmed active exploitation of recently disclosed zero-day Pierluigi Paganini November 16, 2024 Palo Alto Networks confirmed active...
Read more →T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain...
Read more →The U.S. Environmental Protection Agency (EPA) Report Exposes Cybersecurity Risks in US Water Systems: Vulnerabilities in Critical Drinking Water Infrastructure...
Read more →GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects. Most recently, the...
Read more →Introduction As cybersecurity challenges grow more complex, the tools we use to protect data and communications are also advancing. Among...
Read more →