Texas Developer Sentenced for Intentional Computer Damage in Kill Switch Sabotage
A Texas developer faces a potential decade-long prison sentence after being convicted of intentional damage to protected computers at his...
A Texas developer faces a potential decade-long prison sentence after being convicted of intentional damage to protected computers at his...
In Switzerland, operators of critical infrastructure will soon face legal obligations to report cyber-attacks, enhancing national cybersecurity measures. Operators of...
In the past year, an overwhelming 87% of security professionals reported that their organization has encountered AI-driven cyber-attacks, highlighting a...
In recent times, ransomware groups have increasingly favored reliable and repeatable access methods over mass vulnerability exploitation to infiltrate victim...
Medusa ransomware is surging in 2025, with over 40 recent victims reported, particularly hitting the healthcare sector in the US....
Social engineering attacks exploit human psychology rather than technical vulnerabilities, making them a unique and formidable threat in the realm...
In a rising trend of cybersecurity threats, Japanese firms across various sectors are increasingly becoming targets of a sophisticated cyber-intrusion...
The US has recently taken action against i-Soon, a notorious Chinese hacker-for-hire group, revealing extensive hacking operations targeting critical sectors....
Cybersecurity job satisfaction has seen a significant decline, particularly among women. In 2024, only 67% of women expressed satisfaction, down...
Six critical infrastructure sectors are facing significant difficulties in meeting NIS2 compliance requirements, as highlighted by the EU's leading security...
A serious security vulnerability in the Chaty Pro plugin is putting around 18,000 WordPress sites at risk. This could enable...
Organizations are being warned about a growing ransomware scam involving suspicious physical letters, allegedly from the BianLian group. Organizations have...
Google enhances security for Android users with new AI-powered scam detection features designed to identify and block deceptive messages and...
A recent ISACA survey reveals that an overwhelming majority of IT professionals worldwide are grappling with work-related stress and burnout...
Nonprofits are experiencing a significant rise in cybersecurity issues, particularly with a 35.2% increase in email threats, putting essential operations...
According to the SANS Institute, over half of global organizations have experienced an operational technology (OT) incident in the past...
The Chinese espionage group Silk Typhoon has recently shifted its tactics to exploit common IT solutions, according to recent findings...
In a digital age where data breaches and cyber threats are common, cybersecurity compliance and regulations play a crucial role...
CISA has called on federal agencies to promptly address five critical vulnerabilities being actively exploited by cyber threat actors. A...
The online gambling industry is grappling with substantial revenue losses due to fraud, affecting nearly half of businesses in the...
VMware has issued an important security advisory alerting customers about critical zero-day vulnerabilities that are actively being exploited. Immediate remediation...
North Korean hackers are using GitHub strategically to create fake IT worker personas aimed at securing remote job opportunities in...
CISO personal liability risks are prompting organizations to rethink their policies, with 93% implementing changes over the last year. According...
Discover the latest cyber-espionage campaign targeting UAE's aviation and transport, involving sophisticated malware and advanced techniques. A new cyber-espionage campaign...