Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Cognizant TriZetto breach exposes health data of 3.4 million patients
HIGHMassive Data Breach at TriZetto Exposes 3.4 Million Patients' Health Information
AI as tradecraft: How threat actors operationalize AI
HIGHAI in Cybercrime: North Korean Groups Exploit AI for Malicious Activities
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
HIGHVOID#GEIST Malware Unleashes XWorm, AsyncRAT, and Xeno RAT in Stealthy Attack
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
HIGHTransparent Tribe Leverages AI for Mass-Produced Malware Targeting India
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
EC-Council Launches New AI Certifications to Boost U.S. Cybersecurity Workforce
CRITICAL: CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
CRITCISA Urges Immediate Patching of iOS Flaws Exploited in Crypto-Theft
Microsoft 365 Backup to add file-level restore for faster recovery
Microsoft 365 Backup Enhances Recovery with File-Level Restore
California’s PlayOn Enforcement: A New Chapter in Children’s Data Privacy
HIGHCalifornia's Landmark Privacy Settlement with PlayOn Sports Sets New Precedents
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
HIGHIran-Linked MuddyWater Hackers Infiltrate U.S. Networks with Dindoor Backdoor
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
AI-Powered Risk Management: A Game-Changer for MSPs in Cybersecurity
CRITICAL: China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
CRITChina-Linked APT Targets South American Telecoms with Advanced Implants
Ghanain man pleads guilty to role in $100 million fraud ring
HIGHGhanaian National Admits Role in $100 Million Fraud Scheme
Showing 289-300 of 689 articles