Cybersecurity Articles

Student Loan Breach Exposes 2.5M Records

Student Loan Breach Exposes 2.5M Records

Watering Hole Attacks Push ScanBox Keylogger

Watering Hole Attacks Push ScanBox Keylogger

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Ransomware Attacks are on the Rise

Ransomware Attacks are on the Rise

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

How to freeze your credit (and why you might want to)

How to freeze your credit (and why you might want to)

AI Safety Summit round two draws government, industry leaders to Seoul next month

AI Safety Summit round two draws government, industry leaders to Seoul next month

Sisense's data breach is serious enough that CISA is investigating. Here's what you need to do

Sisense

The best VPN services for iPhone and iPad in 2024: Expert tested and reviewed

The best VPN services for iPhone and iPad in 2024: Expert tested and reviewed

AT&T blasts email to 70M customers, causes massive traffic spike at Experian. Here's what happened

AT&T blasts email to 70M customers, causes massive traffic spike at Experian. Here

The US Government Has a Microsoft Problem

The US Government Has a Microsoft Problem

How Israel Defended Against Iran's Drone and Missile Attack

How Israel Defended Against Iran

Space Force Is Planning a Military Exercise in Orbit

Space Force Is Planning a Military Exercise in Orbit

Roku Breach Hits 567,000 Users

Roku Breach Hits 567,000 Users

House Votes to Extend—and Expand—a Major US Spy Program

House Votes to Extend—and Expand—a Major US Spy Program

5 free red teaming resources to get you started

5 free red teaming resources to get you started

AI set to enhance cybersecurity roles, not replace them

AI set to enhance cybersecurity roles, not replace them

Audio deepfakes: What they are, and the risks they present

Audio deepfakes: What they are, and the risks they present

31% of women in tech consider switching roles over the next year

31% of women in tech consider switching roles over the next year

Privacera adds access control and data filtering functionality for Vector DB/RAG

Privacera  adds access control and data filtering functionality for Vector DB/RAG

Cisco Duo warns telephony supplier data breach exposed MFA SMS logs

Cisco Duo warns telephony supplier data breach exposed MFA SMS logs

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

Ukrainian Blackjack group used ICS malware Fuxnet against Russian targets

CISA adds Palo Alto Networks PAN-OS Command Injection flaw to its Known Exploited Vulnerabilities catalog

CISA adds Palo Alto Networks PAN-OS Command Injection flaw to its Known Exploited Vulnerabilities catalog

Threat actors exploited Palo Alto Pan-OS issue to deploy a Python Backdoor

Threat actors exploited Palo Alto Pan-OS issue to deploy a Python Backdoor

U.S. and Australian police arrested Firebird RAT author and operator

U.S. and Australian police arrested Firebird RAT author and operator

Congressional privacy bill looks to rein in data brokers 

Congressional privacy bill looks to rein in data brokers 

House passes extension of expiring surveillance authorities

House passes extension of expiring surveillance authorities

What keeps CISOs up at night? Mandiant leaders share top cyber concerns

What keeps CISOs up at night? Mandiant leaders share top cyber concerns

Six-year old bug will likely live forever in Lenovo, Intel products

Six-year old bug will likely live forever in Lenovo, Intel products

CISA emergency directive tells agencies to fix credentials after Microsoft breach

CISA emergency directive tells agencies to fix credentials after Microsoft breach

Russia and Ukraine Top Inaugural World Cybercrime Index

Russia and Ukraine Top Inaugural World Cybercrime Index

New LockBit Variant Exploits Self-Spreading Features

New LockBit Variant Exploits Self-Spreading Features

Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks

Palo Alto Networks Zero-Day Flaw Exploited in Targeted Attacks

Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims

Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims

FBI Warns of Massive Toll Services Smishing Scam

FBI Warns of Massive Toll Services Smishing Scam

Report finds that only 5% of businesses have a cyber expert

Report finds that only 5% of businesses have a cyber expert

A vulnerability in Linux distributions may allow unauthorized access

A vulnerability in Linux distributions may allow unauthorized access

Security leaders weigh in on the White House's order regarding AI

Security leaders weigh in on the White House

51% of check fraud victims had been targeted two or more times

51% of check fraud victims had been targeted two or more times

Security leaders discuss the U.S. Treasury's concerns regarding AI

Security leaders discuss the U.S. Treasury

TechRepublic’s Review Methodology for VPNs

TechRepublic’s Review Methodology for VPNs

Apple Alerts iPhone Users in 92 Countries to Mercenary Spyware Attacks

Apple Alerts iPhone Users in 92 Countries to Mercenary Spyware Attacks

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers

Checklist: Securing Digital Information

Checklist: Securing Digital Information

4 Best Open Source Password Managers for Teams in 2024

4 Best Open Source Password Managers for Teams in 2024