#BHUSA: Only 22% of Firms Have Mature Threat Intelligence Programs
Only 22% of organizations have achieved a fully matured threat intelligence program, revealed a new report by cybersecurity solutions provider...
Only 22% of organizations have achieved a fully matured threat intelligence program, revealed a new report by cybersecurity solutions provider...
US coastguards discovered an unknown signal 30 miles outside the continental United States. The US National Security Agency (NSA) is...
“When I worked on a report from the US Cyber Safety Review Board about the Log4j vulnerability, I was stunned...
Governor Kathy Hochul has introduced New York's first-ever statewide cybersecurity strategy, reinforced by a $600m commitment. The strategy emerges as a...
The threat actor APT31 (AKA Judgment Panda and Zirconium) has been linked to recent industrial attacks in eastern Europe, according...
A serious data leak has exposed the personal details of police officers and civilian personnel working at the Police Service...
A phishing-as-a-service (PaaS) platform which may have been responsible for over 150,000 phishing domains has been taken offline after an...
The UK’s financial regulatory has warned consumers to be on the lookout for loan fee fraudsters after revealing new research...
Microsoft released updates for 87 vulnerabilities yesterday, including two that are being actively exploited in the wild.The first zero-day was...
The Missouri Department of Social Services (DSS) has issued an alert urging residents to safeguard their personal information following a...
The Rhysida ransomware group, a recent addition to the growing threat landscape, has been implicated in a string of high-impact...
A new security loophole has been found in Spring Security’s latest versions. Tracked as CVE-2023-34034, the flaw has a CVSS...
Multiple zero-day vulnerabilities have been discovered in some of the most used cryptographic multi-party computation (MPC) protocols, putting consumers’ cryptocurrency...
Introduction Background of Threat Hunting Threat hunting is a proactive and iterative approach to detecting and isolating advanced threats that...
A widespread cyber-attack on hospital computer systems has caused significant disruptions across the United States, leading to the closure of...
Cybersecurity experts have discovered a new adware campaign specifically targeting Korean Android users. The discovery by McAfee’s Mobile Research Team shed...
A leading Spanish research institute has become the latest organization in the country to come under cyber-attack from Russia, after...
The US Federal Bureau of Investigation (FBI) has issued a warning concerning a growing wave of financial fraud within the...
The majority (66%) of UK websites are unable to block simple bot attacks, exposing their businesses to fraud, account compromise...
UK organizations lost billions in data breaches between 2019 and 2022, with hundreds of millions of their customers suffering compromise...
Identity theft has established itself as the main initial access method for threat actors, according to CrowdStrike.In its 2023 Threat...
Security researchers have discovered a likely North Korean cyber-espionage campaign targeting the IT network of a Russian manufacturer of intercontinental...
Law firm Morgan & Morgan has lodged a class-action lawsuit against Tampa General Hospital on behalf of three victims affected...
The UK’s Electoral Commission has revealed it has been the victim of a “complex cyber-attack,” exposing the personal details of...