radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

689 articles
|
security

Cognizant TriZetto breach exposes health data of 3.4 million patients

HIGH

Massive Data Breach at TriZetto Exposes 3.4 Million Patients' Health Information

Bleeping ComputerTHREATS24d
security

AI as tradecraft: How threat actors operationalize AI

HIGH

AI in Cybercrime: North Korean Groups Exploit AI for Malicious Activities

Microsoft Security BlogM36524d
security

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

HIGH

VOID#GEIST Malware Unleashes XWorm, AsyncRAT, and Xeno RAT in Stealthy Attack

The Hacker NewsTHREATS24d
security

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

HIGH

Transparent Tribe Leverages AI for Mass-Produced Malware Targeting India

The Hacker NewsTHREATS24d
security

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC-Council Launches New AI Certifications to Boost U.S. Cybersecurity Workforce

Bleeping ComputerTHREATS24d
security

CRITICAL: CISA warns feds to patch iOS flaws exploited in crypto-theft attacks

CRIT

CISA Urges Immediate Patching of iOS Flaws Exploited in Crypto-Theft

Bleeping ComputerTHREATS24d
security

Microsoft 365 Backup to add file-level restore for faster recovery

Microsoft 365 Backup Enhances Recovery with File-Level Restore

Bleeping ComputerTHREATS24d
security

California’s PlayOn Enforcement: A New Chapter in Children’s Data Privacy

HIGH

California's Landmark Privacy Settlement with PlayOn Sports Sets New Precedents

DLA Piper Privacy MattersCOMPLIANCE25d
security

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

HIGH

Iran-Linked MuddyWater Hackers Infiltrate U.S. Networks with Dindoor Backdoor

The Hacker NewsTHREATS25d
security

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

AI-Powered Risk Management: A Game-Changer for MSPs in Cybersecurity

The Hacker NewsTHREATS25d
security

CRITICAL: China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

CRIT

China-Linked APT Targets South American Telecoms with Advanced Implants

The Hacker NewsTHREATS25d
security

Ghanain man pleads guilty to role in $100 million fraud ring

HIGH

Ghanaian National Admits Role in $100 Million Fraud Scheme

Bleeping ComputerTHREATS25d

Showing 289-300 of 689 articles