A report from the charity the Cyber Helpline found that 98% of cyber enabled crimes result in no further action from the ...
An infamous ransomware group has claimed to have compromised sensitive data from a children’s hospital in Liverpool, UK. On ...
A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported ...
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 ...
This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation ...
Arun Narasimhan discusses the Connectivity Standards Alliance (CSA)'s efforts to offer a unified approach to IoT security ...
A cyber-attack targeting Japanese and other East Asian organizations, suspected to be orchestrated by the threat group ...
The UK’s Information Commissioner’s Office argues that regulatory concerns shouldn’t prevent firms sharing data to stop scams ...
CrowdStrike has reached a deal to acquire Adaptive Shield, while Cybereason and Trustwave have entered into a definitive ...
Romania’s national security council suggested that Russia is behind these attacks, amid a court order for a recount of votes in the first round of the country’s presidential election ...
The CSO of T-Mobile has clarified that no customer information was stolen by Chinese hacking group Salt Typhoon ...
Running from September 2 to October 31, Operation Serengeti involved authorities across 19 African nations. It targeted ...