The release builds on CISA’s Emergency Directive 25-02 and outlines measures such as restricting administrator access, using ...
Cybercriminals are helping traditional organized crime groups steal physical goods via cargo freight hijacking. Researchers ...
Flaws in Windows Graphics Device Interface (GDI) have been identified that allow remote code execution and information ...
Ukrainian national Oleksii Oleksiyovych Lytvynenko has appeared in a US court in connection with Conti ransomware charges ...
Since January 2024, over 2100 victims across Europe were named on extortion leak sites, with 92% involving file encryption ...
Over 10.5 million individuals were impacted by a widespread 2024 data breach at Conduent Business Services, with customer ...
The King Addons for Elementor plugin contains two flaws allowing unauthenticated file uploads and privilege escalation ...
US-based facial recognition firm Clearview AI has been accused of ignoring actions handed down by several EU data protection ...
A rise in attacks on PHP servers, IoT devices and cloud gateways is linked to botnets exploiting flaws, according to new ...
In fact, international momentum is already gathering to oppose the burgeoning trade in commercial spyware tools and related ...
UNC6384 is a Chinese-linked cyber espionage group identified by Google’s Threat Intelligence Group (GTIG) in August 2025. The ...
However, one of the biggest purchases saw Veeam announce the acquisition of Securiti AI for $1.725bn, while AT&T spinoff ...