Jaguar Land Rover profit slumps after cyber attack
Jaguar Land Rover (JLR) continues to face financial fallout from the devastating 2025 cyber attack on its systems, with sales and profits dropping precipitously during…
Jaguar Land Rover (JLR) continues to face financial fallout from the devastating 2025 cyber attack on its systems, with sales and profits dropping precipitously during…
Small inefficiencies often show up – a delayed campaign here, inconsistent data there – until they begin to impact customer experience, operational speed, and increasingly,…
SecurityWeek’s weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but remain relevant to the broader…
CVE-2026-42897: Microsoft confirms active exploitation of Exchange Server zero-day Pierluigi Paganini May 15, 2026 Microsoft warned that attackers are exploiting a new Exchange Server zero-day…
Researchers discovered the authentication bypass vulnerability while investigating a prior issue in the same service. Source link
Attackers returned once again to a common target with a massive user base by exploiting a max-severity zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and…
Executive Summary This article examines new obfuscation techniques the Gremlin stealer malware uses to conceal malicious payloads within embedded resources. We analyze a variant protected…
“A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an…
Researchers at Darktrace disclosed a China-linked cyberespionage campaign targeting organizations primarily across the Asia-Pacific and Japan region using an updated version of the FDMTP backdoor…
The U.S. National Institute of Standards and Technology advanced nine digital signature algorithms to the third round of its additional post-quantum cryptography standardization effort, as…
The first alerts showed up on February 19. Then again, on February 24. Initially, it was just small blips in a sea of alerts. The…
In recent months, a new infostealer malware known as REMUS has emerged across the cybercrime landscape, drawing attention from security researchers and malware analysts. Several…