A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying reports, which affects tens of thousands…
What follows is based on our combined experience of around 52 years of legal advice to the IT and outsourcing…
Ransomware threat landscape Jan-Apr 2024: insights and challenges Pierluigi Paganini June 24, 2024 Between Jan and Apr 2024, the global…
ESET, a leading cybersecurity company, recently addressed a local privilege escalation vulnerability in its Windows security products. The Zero Day…
“I can tell you with complete confidence that ransomware attacks harm patients,” says Hannah Neprash, an associate professor of health…
Jun 24, 2024NewsroomCyber Espionage / Hacking A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign…
A former Post Office investigator who deleted information from an expert IT witness statement during the wrongful prosecution of a…
Jollibee Foods Corporation (JFC), which is the largest fast-food chain operator in Philippines, has launched an investigation for an alleged…
The Handala hacker group has claimed responsibility for breaching Zerto, an Israeli firm specializing in critical cybersecurity services. The Zerto…
ExCobalt Cybercrime group targets Russian organizations in multiple sectors Pierluigi Paganini June 24, 2024 The cybercrime group ExCobalt targeted Russian…
UnitedHealth has, for the first time, detailed the types of medical and patient data stolen in the extensive cyberattack on…
A new vulnerability, CVE-2024-29973, has been discovered in Zyxel NAS devices, exposing them to attacks from a Mirai-like botnet. This…











