Cybersecurity Articles

Student Loan Breach Exposes 2.5M Records

Student Loan Breach Exposes 2.5M Records

Watering Hole Attacks Push ScanBox Keylogger

Watering Hole Attacks Push ScanBox Keylogger

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Ransomware Attacks are on the Rise

Ransomware Attacks are on the Rise

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

The best VPN for Mac in 2024: Expert tested and reviewed

The best VPN for Mac in 2024: Expert tested and reviewed

The best VPN services for iPhone: Expert tested and reviewed

The best VPN services for iPhone: Expert tested and reviewed

Wiping your Windows laptop? Here's the simplest way to erase all personal data

Wiping your Windows laptop? Here

Why you should power off your phone at least once a week - according to the NSA

Why you should power off your phone at least once a week - according to the NSA

More of Internet Archive is back online, despite hackers infiltrating its helpdesk

More of Internet Archive is back online, despite hackers infiltrating its helpdesk

Exposed United Nations Database Left Sensitive Information Accessible Online

Exposed United Nations Database Left Sensitive Information Accessible Online

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

The Shitposting Cartoon Dogs Sending Trucks, Drones, and Weapons to Ukraine’s Front Lines

ICE's $2 Million Contract With a Spyware Vendor Is Under White House Review

ICE

A Trump Win Could Unleash Dangerous AI

A Trump Win Could Unleash Dangerous AI

US Government Says Relying on Chinese Lithium Batteries Is Too Risky

US Government Says Relying on Chinese Lithium Batteries Is Too Risky

Cranium Detect AI accelerates AI governance

Cranium Detect AI accelerates AI governance

SailPoint Machine Identity Security reduces the risk associated with unmanaged machine identities

SailPoint Machine Identity Security reduces the risk associated with unmanaged machine identities

Kusari helps organizations gain visibility into their software

Kusari helps organizations gain visibility into their software

IBM Guardium Data Security Center protects hybrid cloud and AI

IBM Guardium Data Security Center protects hybrid cloud and AI

Packet Capture cStor 200S enables organizations to capture, analyze, and optimize network traffic

Packet Capture cStor 200S enables organizations to capture, analyze, and optimize network traffic

Samsung zero-day flaw actively exploited in the wild

Samsung zero-day flaw actively exploited in the wild

Experts warn of a new wave of Bumblebee malware attacks

Experts warn of a new wave of Bumblebee malware attacks

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds ScienceLogic SL1 flaw to its Known Exploited Vulnerabilities catalog

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

VMware failed to fully address vCenter Server RCE flaw CVE-2024-38812

Cisco states that data published on cybercrime forum was taken from public-facing DevHub environment

Cisco states that data published on cybercrime forum was taken from public-facing DevHub environment

US officials warn foreign disinformation from Russia may flood post-election period

US officials warn foreign disinformation from Russia may flood post-election period

Task force unveils cyber recommendations for the next president

Task force unveils cyber recommendations for the next president

SEC hits four companies with fines for misleading disclosures around SolarWinds hack

SEC hits four companies with fines for misleading disclosures around SolarWinds hack

Ransomware attacks on health care sector are driving increase in emergency patient care

Ransomware attacks on health care sector are driving increase in emergency patient care

Justice Department rule aims to curb the sale of Americans’ personal data overseas

Justice Department rule aims to curb the sale of Americans’ personal data overseas

LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks

LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks

SEC Charges Tech Firms Over Misleading SolarWinds Hack Disclosures

SEC Charges Tech Firms Over Misleading SolarWinds Hack Disclosures

75% of US Senate Campaign Websites Fail to Implement DMARC

75% of US Senate Campaign Websites Fail to Implement DMARC

Phishing Attack Impacts Over 92,000 Transak Users

Phishing Attack Impacts Over 92,000 Transak Users

Meta to Fight Celeb-Bait Scams with Facial Recognition

Meta to Fight Celeb-Bait Scams with Facial Recognition

Iranian cyber actors are targeting critical infrastructure entities

Iranian cyber actors are targeting critical infrastructure entities

Research uncovers new attack method, security leaders share insights

Research uncovers new attack method, security leaders share insights

34% of CIOs ranked securing the network as their number one priority

34% of CIOs ranked securing the network as their number one priority

SolarWinds Help Desk software vulnerability added to CISA catalogue

SolarWinds Help Desk software vulnerability added to CISA catalogue

A CISO’s guide to creating a cyber resilience toolkit

A CISO’s guide to creating a cyber resilience toolkit

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

Can Security Experts Leverage Generative AI Without Prompt Engineering Skills?

NordVPN Review (2024): Is NordVPN Worth the Cost?

NordVPN Review (2024): Is NordVPN Worth the Cost?

What Is Secure Access Service Edge?

What Is Secure Access Service Edge?

ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks

ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks

Get 9 Courses on Ethical Hacking for Just $50

Get 9 Courses on Ethical Hacking for Just $50