A threat actor known as Menelik made a post on the cybercrime site BreachForums on April 28 claiming to have access to 49 ...
While Google confirmed that the bug exists in the wild, security researchers say there has yet to have been an instance of ...
A panel of experts unpack the art of cyber insurance here at RSA Conference and share what's new in coverage and claims.
BleepingComputer reports that widely used cloud-based project management platform Monday.com had its "Share Update" feature ...
Zscaler removed an internet-exposed test environment without any customer data following rumors that it was the company ...
California-based online mental health provider BetterHelp was noted by the Federal Trade Commission to have begun ...
Threat actors have leveraged Ivanti Connect Secure and Policy Secure zero-day vulnerabilities, tracked as CVE-2023-46805 and ...
Editor's Note: On Friday morning, May 10, CNN reported that four sources briefed on the Ascension hack investigation said ...
Here are four practical steps security teams can take to more effectively prepare for inevitable ransomware attacks.
LockBit ransomware gang administrator LockBitSupp has denied being Russian national Dmitry Yuryevich Khoroshev, who he says ...
Chinese cyberespionage group Volt Typhoon's infiltration of U.S. critical infrastructure entities has been regarded by ...
A new technique dubbed “TunnelVision” that exploits a DHCP design flaw lets attackers manipulate routing tables so they can ...