1.) Recently, the Qilin ransomware group, believed to originate from Russia, targeted three hospitals and a network, severely disrupting emergency…
Password security has seen dramatic shifts driven by the escalation of cyber threats and technological advancements. This eBook covers: Best…
Organizations have made progress in the past 12 months related to advancing their OT security posture, but there are still…
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data…
Cybersecurity and infosecurity professionals say that work-related stress, fatigue, and burnout are making them less productive, including taking extended sick…
A coding error in an access control allegedly left an API open to abuse, facilitating the Optus data breach, according…
T-Mobile has denied it was breached or that source code was stolen after a threat actor claimed to be selling…
Researchers have discovered a new phishing campaign that relies on a phishing-as-a-service platform called ONNX Store, available for purchase over…
Australia Post is tightening up remote access security for employees and third parties as it renews a cloud hosting agreement…
Alleged researchers stole $3 million from Kraken exchange Pierluigi Paganini June 19, 2024 Alleged researchers have exploited a zero-day in…
Image: DigitalIceAge Forklift manufacturer Crown Equipment confirmed today that it suffered a cyberattack earlier this month that disrupted manufacturing at its…
Bayer’s crop science division is increasingly turning to artificial intelligence in its battle against crop killing weeds, the company told…











