A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and…
Security
A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties…
Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything…
Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d…
Cybersecurity researchers have discovered two security flaws in Microsoft’s Azure Health Bot Service that, if exploited, could permit a malicious…
The Indian Computer Emergency Response Team (CERT-In), the government agency responsible for cybersecurity in the country, has issued a high-severity…
A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an architectural bug impacting…
In episode 11 of The AI Fix, OpenAI battles a Shakespearean lawyer, Graham sings an uncanny bluegrass acrostic, Google drops…
The suspected architect of the Ransomware-as-a-service model, who called himself the “J.P. Morgan” of the underground cybercrime world, has been…
As a CEO, managing third-party risk is a critical aspect of your organization’s overall risk management strategy. With the increasing…
Security researchers have found a trove of threat actor tools that can bypass security defenses like Windows Defender and Malwarebytes,…
The Azure Health Bot Service, a cloud platform designed for healthcare organizations to create and deploy AI-powered virtual health assistants,…
The Swedish Data Protection Authority (IMY) is being taken to court by the privacy advocacy group noyb for its alleged…
A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing…
Over 100 Ukrainian state and local government computers have been compromised with MeshAgent malware in a phishing campaign leveraging trust…
In a coordinated international takedown, the FBI, in collaboration with law enforcement agencies across the globe, has dismantled the infrastructure…
While industrial VPN gateways such as Cosy+ play a crucial role in enabling secure remote access to critical operational technology…
In the world of cybersecurity, keeping up with the latest trends and challenges can feel like trying to find your…
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security…
Twitter International, now rebranded as “X,” has been accused of unlawfully using the personal data of over 60 million users…