There are three factors that differentiate crypto and blockchain organizations from other industries; their attack surfaces, their most common vulnerabilities,…
Automobile parts giant LKQ Corporation disclosed that one of its business units in Canada was hacked, allowing threat actors to…
CISA confirmed today that a critical security vulnerability in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited…
German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox Pierluigi Paganini December 13, 2024 The German agency…
In a privilege escalation attack, an attacker gains elevated rights, permissions, or entitlements beyond the intended level associated with their…
Citrix Netscaler is the latest target in widespread password spray attacks targeting edge networking devices and cloud platforms this year to…
Across New Jersey, reports of mysterious drone sightings have been rising for weeks, with people contacting authorities and posting on…
SUMMARY Cybersecurity researcher Jeremiah Fowler discovered an unprotected Care1 database with over 4.8 million patient records. Exposed data included names,…
Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to…
It’s that time of year where we, in the industry, attempt to be cyber soothsayers. A tall order – even…
Russian cyberspies Gamaredon has been discovered using two Android spyware families named ‘BoneSpy’ and ‘PlainGnome’ to spy on and steal…
Health Tech is booming, projected to grow from $312.92B in 2024 to $981.23B by 2032. Serhiy Tokarev highlights its social…











