Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from…
By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data…
The MEDUSA ransomware group has reared its ugly head again and this time it has claimed to have targeted three…
JetBrains fixed IntelliJ IDE flaw exposing GitHub access tokens Pierluigi Paganini June 12, 2024 JetBrains warned to fix a critical…
Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review…
In fact, ransomware attacks on health care targets were on the rise even before the Change Healthcare attack, which crippled…
Phishing scams are a constant threat, but have you ever wondered which brands scammers impersonate the most? New research by…
Recent cyberattacks targeting the nation’s healthcare system have demonstrated the vulnerability of hospitals and payment systems. Providers across the health…
Jun 12, 2024Newsroom State-sponsored threat actors backed by China gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a…
The United Kingdom and Canada privacy watchdogs announced a joint investigation this week to determine the security lapses in the…
VideoLAN, the organization behind the popular VLC Media Player, has disclosed multiple critical vulnerabilities that could allow attackers to execute…











