Beware of threats lurking in booby-trapped PDF files
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
Aggregating 3822 articles from trusted cybersecurity sources
Looks can be deceiving, so much so that the familiar icon could mask malware designed to steal your data and money.
Manufacturers operate in one of the most unforgiving threat environments and face a unique set of pressures that make attacks particularly damaging
ESET researchers have discovered campaigns distributing spyware disguised as Android Signal and ToTok apps, targeting users in the United Arab Emirates
We're kicking off the month with a focus on the human element: the first line of defense, but also the path of least resistance for many cybercriminals
The past 30 days have seen no shortage of new threats and incidents that brought into sharp relief the need for well-thought-out cyber-resilience plans
You could be getting more than you bargained for when you download that cheat tool promising quick wins
Malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers
Posted by Elie Bursztein and Marianna Tishchenko, Google Privacy, Safety and Security Team Empowering cyber defenders with AI is critical to tilting the cybe...
Advisory at a Glance Executive Summary CISA began incident response efforts at a U.S.
What you see is not always what you get as cybercriminals increasingly weaponize SVG files as delivery vectors for stealthy malware
Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
Major U.S.
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissio...
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive informat...
Cybernews reports that leading global luxury apparel retail firms Lacoste, Ralph Lauren, Canada Goose, and Carter's were claimed to have had their "supply ch...
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
Cookeville Regional Medical Center was targeted last year by the Rhysida ransomware group, which stole 500GB of data. The post Data Breach at Tennessee Hospi...
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company's Salesforce environment ear...
A hacking group claims to have broken into the flood defence system protecting Venice's Piazza San Marco - and is offering to sell access to whoever wants it...
Major U.S.
Hacking group ShinyHunters has listed the National Railroad Passenger Corporation on its data leak site, claiming to have stolen 9.4 million records containi...
BleepingComputer reports that McGraw-Hill has disclosed that the limited set of data exposed during a breach caused by a Salesforce misconfiguration was non-...