Cybersecurity Articles

Student Loan Breach Exposes 2.5M Records

Student Loan Breach Exposes 2.5M Records

Watering Hole Attacks Push ScanBox Keylogger

Watering Hole Attacks Push ScanBox Keylogger

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Ransomware Attacks are on the Rise

Ransomware Attacks are on the Rise

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

These transparent earbuds by Nothing made my AirPods look and sound boring

These transparent earbuds by Nothing made my AirPods look and sound boring

The best Alexa devices of 2024: Expert tested and recommended

The best Alexa devices of 2024: Expert tested and recommended

How to calibrate your TV for the best picture quality - 2 easy and simple methods

How to calibrate your TV for the best picture quality - 2 easy and simple methods

This Asus Copilot+ PC has one of the best displays I've seen on a laptop (and it exudes premium)

This Asus Copilot+ PC has one of the best displays I

One of the best budget Android tablets I've tested is not made by Samsung or Google

One of the best budget Android tablets I

A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them

A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them

Europe Is Pumping Billions Into New Military Tech

Europe Is Pumping Billions Into New Military Tech

At the Olympics, AI Is Watching You

At the Olympics, AI Is Watching You

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

This Machine Exposes Privacy Violations

This Machine Exposes Privacy Violations

Ledger Flex: Secure self-custody with E Ink touchscreen display

Ledger Flex: Secure self-custody with E Ink touchscreen display

Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)

Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)

16% of organizations experience disruptions due to insufficient AI maturity

16% of organizations experience disruptions due to insufficient AI maturity

AI-generated deepfake attacks force companies to reassess cybersecurity

AI-generated deepfake attacks force companies to reassess cybersecurity

Most CISOs feel unprepared for new compliance regulations

Most CISOs feel unprepared for new compliance regulations

A bug in Chrome Password Manager caused user credentials to disappear

A bug in Chrome Password Manager caused user credentials to disappear

BIND updates fix four high-severity DoS bugs in the DNS software suite

BIND updates fix four high-severity DoS bugs in the DNS software suite

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Terrorist Activity is Accelerating in Cyberspace – Risk Precursor to Summer Olympics and Elections

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Progress Software fixed critical RCE CVE-2024-6327 in the Telerik Report Server

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

Senate Intel chair warns confluence of factors make election threats worse

Senate Intel chair warns confluence of factors make election threats worse

North Korean hacker used hospital ransomware attacks to fund espionage

North Korean hacker used hospital ransomware attacks to fund espionage

Banking, oil and IT industry reps call on Congress to harmonize cyber regulations … again

Banking, oil and IT industry reps call on Congress to harmonize cyber regulations … again

North Korean hacking group makes waves to gain Mandiant, FBI spotlight

North Korean hacking group makes waves to gain Mandiant, FBI spotlight

Cyber firm KnowBe4 hired a fake IT worker from North Korea

Cyber firm KnowBe4 hired a fake IT worker from North Korea

Synnovis Restores Systems After Cyber-Attack, But Blood Shortages Remain

Synnovis Restores Systems After Cyber-Attack, But Blood Shortages Remain

Hacktivists Claim Leak of CrowdStrike Threat Intelligence

Hacktivists Claim Leak of CrowdStrike Threat Intelligence

Despite Bans, AI Code Tools Widespread in Organizations

Despite Bans, AI Code Tools Widespread in Organizations

North Korean Hackers Target Critical Infrastructure for Military Gain

North Korean Hackers Target Critical Infrastructure for Military Gain

Ransomware and BEC Make Up 60% of Cyber Incidents

Ransomware and BEC Make Up 60% of Cyber Incidents

One year after SEC cyber disclosure ruling, security leaders weigh in

One year after SEC cyber disclosure ruling, security leaders weigh in

12.9 million individuals affected by MediSecure cyber breach

12.9 million individuals affected by MediSecure cyber breach

Security leaders share thoughts on Microsoft-Crowdstrike outage

Security leaders share thoughts on Microsoft-Crowdstrike outage

SEC establishes Interagency Securities Council (ISC)

SEC establishes Interagency Securities Council (ISC)

Data breach victims increased by 490% since the first half of 2023

Data breach victims increased by 490% since the first half of 2023

Master Cybersecurity With The Complete CompTIA Security+ SY0-701 Certification Kit by IDUNOVA

Master Cybersecurity With The Complete CompTIA Security+ SY0-701 Certification Kit by IDUNOVA

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

F5: AI Applications Will Complicate ‘Unsustainable’ Hybrid Multicloud Sprawl in Australia

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

Summer Olympics: What IT Teams Need to Do Before & During the Event for Their Businesses

CrowdStrike: Buggy Validator Started Massive Outage

CrowdStrike: Buggy Validator Started Massive Outage

Private Internet Access (PIA) vs NordVPN: Which VPN Is Better?

Private Internet Access (PIA) vs NordVPN: Which VPN Is Better?