News

The US airline said that incident was affecting some of its IT systems, but flights are continuing to operate safely and as ...
This new CitrixBleed lookalike flaw is being exploited in the wild to gain initial access, according to ReliaQuest ...
GreyNoise observed a surge in scanning activity targeting MOVEit Transfer systems since May 27, indicating the software could ...
The hackers are also suspected of being behind several cyber-attacks, including against the French Football Federation ...
A patient’s death has been officially linked to the 2024 ransomware attack on Synnovis, the pathology services provider for ...
NSA and CISA are urging developers to adopt memory safe languages (MSLs) to combat vulnerabilities in software ...
To address the growing risks, Backslash Security has introduced the MCP Server Security Hub, a searchable database evaluating ...
The ClickFix social engineering technique has become the second most common attack vector, behind only phishing, according to ...
The threat actor used a combination of open-source and publicly available tools to establish their attack framework ...
Sushila Nair sets out seven steps to take to build a cybersecurity program that aligns with the organization's strategic ...
More than 743,000 individuals have been affected by a data breach at Michigan-based McLaren Health Care. The nonprofit health ...
China-nexus actors are using a network of Operational Relay Boxes (ORBs) including compromised connected devices to target ...