A report from the charity the Cyber Helpline found that 98% of cyber enabled crimes result in no further action from the ...
An infamous ransomware group has claimed to have compromised sensitive data from a children’s hospital in Liverpool, UK. On ...
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 ...
CrowdStrike has reached a deal to acquire Adaptive Shield, while Cybereason and Trustwave have entered into a definitive ...
A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported ...
Romania’s national security council suggested that Russia is behind these attacks, amid a court order for a recount of votes in the first round of the country’s presidential election ...
Arun Narasimhan discusses the Connectivity Standards Alliance (CSA)'s efforts to offer a unified approach to IoT security ...
This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation ...
The UK’s Information Commissioner’s Office argues that regulatory concerns shouldn’t prevent firms sharing data to stop scams ...
A cyber-attack targeting Japanese and other East Asian organizations, suspected to be orchestrated by the threat group ...
Running from September 2 to October 31, Operation Serengeti involved authorities across 19 African nations. It targeted ...
The CSO of T-Mobile has clarified that no customer information was stolen by Chinese hacking group Salt Typhoon ...