CISA Releases Cybersecurity Guidance for Healthcare, Public Health Organizations
The US cybersecurity agency CISA has published new guidance to help healthcare and public health organizations understand the cyber threats...
Read more →The US cybersecurity agency CISA has published new guidance to help healthcare and public health organizations understand the cyber threats...
Read more →The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software – the measuring of...
Read more →New research by Outpost24 has revealed that malware developers are using sandbox evasion techniques to avoid exposing malicious behaviour inside a...
Read more →From installing firewalls to choosing secure hosting, every aspect is crucial in online business. Are you in the process of...
Read more →Morgan Stanley has agreed to a $6.5 million settlement over insecurely disposing of hardware containing unencrypted personal information. Through negligent...
Read more →Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies Pierluigi Paganini November 20, 2023 Russia-linked cyberespionage group APT29 has...
Read more →Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm) stands out in Russian espionage by exclusively targeting Ukrainian entities. Unusually evident, it...
Read more →A ransomware attack targeted Yamaha Motor Co., Ltd., resulting in a partial disclosure of the personal information maintained by the...
Read more →A survey of 280 software engineers conducted in October has reported that over half (53%) suspected that malpractices were occuring...
Read more →Microsoft snapped up Sam Altman and another architect of OpenAI for a new venture after their sudden departures shocked the...
Read more →A high-severity Remote Code Execution (RCE) flaw in Splunk Enterprise has been discovered, enabling an attacker to upload malicious files. Versions...
Read more →Threat intelligence (TI) is critical to organizations’ cybersecurity infrastructure, allowing them to keep track of the evolving threat landscape and...
Read more →