Cybersecurity | Data Exfiltration | Healthcare | Healthcare Security | Ransomware KillSec ransomware targeting healthcare IT systems
Authentication Vulnerabilities | Cybersecurity | WebAuthn Exploits Bypassing Passkey Login through Manipulation of the WebAuthn Process
Cybersecurity | Infrastructure Security | Sabotage Pro-Russian hackers probably sabotaged Norwegian dam
Cybersecurity | Industrial Control Systems | Vulnerability Exploitation Operational Technology (OT) networks are being extensively targeted due to vulnerabilities found in Erlang/OTP.
Cybersecurity | Exploits | Threat Actors Russian hackers took advantage of a WinRAR zero-day vulnerability to launch attacks in Europe and Canada.
Cyberespionage | Cybersecurity | Vulnerabilities RomCom hackers are utilizing a zero-day vulnerability in WinRAR to conduct specific targeted attacks.
Cybersecurity | Public Transportation | Vulnerabilities Complimentary Wi-Fi makes buses susceptible to hacking from remote locations.
Customer Privacy | Cybersecurity | Data Breach Bouygues, a French telecommunications company, has reported that a data breach has impacted 6.4 million of its customers.
Cybersecurity | Data Breach | Personal Information Protection A data breach at Columbia University has affected 860,000 individuals.
Cloud Security | Cybersecurity | Vulnerability Management Organizations Alerted to Security Flaw in Microsoft Exchange Hybrid Setup
AI-Powered Investigations | Cybersecurity | Identity Threat Protection SpyCloud Improves Its Investigations Solution by Incorporating AI-Driven Insights – Transforming the Analysis of Insider Threats and Cybercrime.
Cybersecurity | Remote Code Execution | Vulnerabilities Vulnerabilities in CyberArk Conjur have led to the exposure of sensitive enterprise information.
Cybersecurity Pandora, the worldwide jewelry brand, has experienced a security breach resulting in the exposure of customer information.
AI Development Tools | Cybersecurity | Software Vulnerabilities A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
AI Technology | Cybersecurity | Malware Detection Microsoft’s Project Ire independently reverse engineers software to detect malware.
Cybersecurity How Data Breaches Power Illicit Marketplaces Selling Your Personal Information to Criminals
Cybersecurity Protecting Your Data Privacy: Key Reasons Why It’s at Risk and How You Can Safeguard It