radar

ONE Sentinel

article

All Articles

ALL TIME

Browse all curated articles across categories

689 articles
security

Cognizant TriZetto breach exposes health data of 3.4 million patients

HIGH

Massive Data Breach at TriZetto Exposes 3.4 Million Patients' Health Information

Bleeping ComputerTHREATS24d
security

AI as tradecraft: How threat actors operationalize AI

HIGH

AI in Cybercrime: North Korean Groups Exploit AI for Malicious Activities

Microsoft Security BlogM36525d
security

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

HIGH

VOID#GEIST Malware Unleashes XWorm, AsyncRAT, and Xeno RAT in Stealthy Attack

The Hacker NewsTHREATS25d
security

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

HIGH

Transparent Tribe Leverages AI for Mass-Produced Malware Targeting India

The Hacker NewsTHREATS25d
security

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC-Council Launches New AI Certifications to Boost U.S. Cybersecurity Workforce

Bleeping ComputerTHREATS25d
security

CRITICAL: CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

CRIT

CISA Urges Immediate Patching of iOS Flaws Exploited in Crypto-Theft

Bleeping ComputerTHREATS25d
security

Microsoft 365 Backup to add file-level restore for faster recovery

Microsoft 365 Backup Enhances Recovery with File-Level Restore

Bleeping ComputerTHREATS25d
security

California’s PlayOn Enforcement: A New Chapter in Children’s Data Privacy

HIGH

California's Landmark Privacy Settlement with PlayOn Sports Sets New Precedents

DLA Piper Privacy MattersCOMPLIANCE25d
security

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

HIGH

Iran-Linked MuddyWater Hackers Infiltrate U.S. Networks with Dindoor Backdoor

The Hacker NewsTHREATS25d
security

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

AI-Powered Risk Management: A Game-Changer for MSPs in Cybersecurity

The Hacker NewsTHREATS25d
security

CRITICAL: China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

CRIT

China-Linked APT Targets South American Telecoms with Advanced Implants

The Hacker NewsTHREATS25d
security

Ghanain man pleads guilty to role in $100 million fraud ring

HIGH

Ghanaian National Admits Role in $100 Million Fraud Scheme

Bleeping ComputerTHREATS25d