Stanford University discloses data breach affecting PhD applicants
Stanford University disclosed a data breach after files containing Economics Ph.D. program admission information were downloaded from its website between...
Stanford University disclosed a data breach after files containing Economics Ph.D. program admission information were downloaded from its website between...
Mass media and publishing giant News Corporation (News Corp) says that attackers behind a breach disclosed in 2022 first gained access...
The Amsterdam cybercrime police team has arrested three men for ransomware activity that generated €2.5 million from extorting small and...
Canada's second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what appears to...
The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat detection, incident response,...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber vigilance, as Russia's...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan...
Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android. While the Android...
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered "serious loopholes" that...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to...
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by the...
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct set of tools....
The (Other) Risk in Finance# A few years ago, a Washington-based real estate developer received a document link from First...
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine products since January...
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs,...
Cybersecurity researchers are warning of "imposter packages" mimicking popular libraries available on the Python Package Index (PyPI) repository. The 41...
At the beginning of January, Gcore faced an incident involving several L3/L4 DDoS attacks with a peak volume of 650...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
Apple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS, and macOS....
Shipping companies and medical laboratories in Asia have been the subject of a suspected espionage campaign carried out by a...
If you Google "third-party data breaches" you will find many recent reports of data breaches that were either caused by...
In what's a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the npm repository in...
An open source command-and-control (C2) framework known as Havoc is being adopted by threat actors as an alternative to other...