2024 was a difficult year for healthcare cybersecurity, but there are some hopeful signs heading into 2025, with effective controls…
Security
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security…
A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024…
Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in…
A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks…
A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware…
In February 2024, Serbian journalist Slaviša Milanov was taken to a police station following what seemed like a routine traffic…
In episode 29 of The AI Fix, an AI company makes the bold step of urging us to “stop hiring…
Cyberattacks this year have escalated into a high-stakes battle, with increasingly advanced attacks targeting critical infrastructure, personal data, and corporate…
Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around $263 million) for…
The Cybersecurity and Infrastructure Security Agency (CISA) and the Office of the National Cyber Director (ONCD) have jointly published a…
INTERPOL is calling for a linguistic shift that aims to put to an end to the term “pig butchering,” instead…
BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and Remote Support (RS) products that…
While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments…
The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks…
Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for…
Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed…
Online romance and investment scams are painful enough without its victims being described as “pigs.” Read more in my article…