FBI investigates data breach impacting U.S. House members and staff
The FBI is investigating a data breach affecting U.S. House of Representatives members and staff after their account and sensitive...
The FBI is investigating a data breach affecting U.S. House of Representatives members and staff after their account and sensitive...
Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat since the early...
Iranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S. think tank. "Notably...
The infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt to carry out...
Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that could enable...
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to...
The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity...
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor...
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies, and other sectors....
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage...
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to a...
The massive breach at LastPass was the result of one of its engineers failing to update Plex on their home...
Europol has announced that law enforcement in Germany and Ukraine targeted two individuals believed to be core members of the...
The Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing its customers’ sensitive mental...
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach...
The Sandbox blockchain game is warnings its community that a security incident caused some users to receive fraudulent emails impersonating...
An ongoing hacking campaign called 'Hiatus' targets DrayTek Vigor router models 2960 and 3900 to steal data from victims and...
A proof-of-concept for CVE-2023-21716, a critical vulnerability in Microsoft Word that allows remote code execution, has been published over the...
Organizations rapidly adopt the cloud as they rely heavily on data and technology to drive their businesses. These organizations utilize...