The Competition and Markets Authority (CMA) has secured a four-month extension to complete its investigation into inner workings of the…
Sensitive tax information of citizens in the U.S. could potentially be stolen after the notorious LockBit ransomware group has claimed…
US law enforcement has disrupted a second major Chinese hacking group nicknamed “Flax Typhoon” and wrested thousands of compromised devices…
Cybersecurity in healthcare has never been more urgent. As the most vulnerable industry and largest target for cybercriminals, healthcare is…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting…
A botnet operated by the Chinese state-sponsored threat actor known as Flax Typhoon has been disrupted by the law enforcement…
A clever threat campaign is abusing GitHub repositories to distribute malware targeting users who frequent an open source project repository or…
The Tor Project has responded to recent reports that law enforcement agencies in Germany have successfully infiltrated the Tor network…
For many years, the primary focus of cybersecurity efforts has been on protecting computer servers from hackers intent on encrypting,…
Sep 19, 2024Ravie LakshmananHealthcare / Malware Microsoft has revealed that a financially motivated threat actor has been observed using a…
Today’s digital transformation is rapidly changing the IT and cybersecurity landscape: Remote work and the increased shift to the cloud…
Strivacity released Strivacity AI Assist, a new “smart assistant” powered by GenAI that makes it easier to manage and secure…











