APT Group StormBamboo Attacks ISP Customers Via DNS Poisoning
Security researchers have uncovered a sophisticated supply chain attack campaign stemming from the compromise of an unnamed ISP.Volexity said the...
Security researchers have uncovered a sophisticated supply chain attack campaign stemming from the compromise of an unnamed ISP.Volexity said the...
TikTok and parent company ByteDance are in the dock again after the Justice Department and FTC filed a civil lawsuit...
The White House and EC-Council have announced a $15m pledge to train over 50,000 students in critical cybersecurity skills.The scholarship...
Organizations utilizing Apache OFBiz have been warned to promptly address a critical vulnerability due to escalating exploitation attempts targeting a...
TikTok has agreed to permanently withdraw its ‘Lite Rewards’ program from the EU in response to EU Commission concerns about...
A new report from HP Wolf Security has highlighted the growing danger from threat actors targeting physical device supply chains...
Eighty-six percent of respondents have identified unknown organizational cyber-risks as a top concern, according to the Critical Start 2024 Cyber Risk...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable threat actors to...
The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years of administrative law, leading to...
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called...
Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such...
Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial...
A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute...
The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to push malicious software updates...
The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform...
Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter Notebooks. The activity, codenamed...
The UK’s Information Commissioner’s Office (ICO) has put 11 social media and video sharing platforms “on notice” for failing to...
The gaming industry has faced a 94% increase in layer 7 distributed denial-of-service (DDoS) attacks over the past year.According to...
The US Environmental Protection Agency (EPA) urgently needs to address rising cyber risks to water and wastewater systems, a new...
The UK’s National Cyber Security Centre (NCSC) has set out plans to launch a new version of its Active Cyber...
A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing...
A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties...
In today's digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer...