Zyxel Patches Critical Router Flaw Amid New OT Cyber Threat Scoring System
Severity rating model aims to bring clarity to operational technology incidents
Read latest briefing βπ€ Desk
Cybersecurity, Privacy, Threats and defense
Severity rating model aims to bring clarity to operational technology incidents
Read latest briefing βDesk archive
Microsoft has uncovered a coordinated campaign targeting software developers with malicious repositories posing as legitimate Next.js projects, exploiting trust in shared code to execute undetected.
The US Treasury Department has sanctioned a Russian exploit broker and its owner for buying stolen zero-day exploits from a former US defense contractor executive, marking the first use of a new law targeting
A Ukrainian man has been sentenced to five years in prison for helping North Korean IT workers gain remote jobs at US companies using stolen identities.
Espionage case highlights risks of insider threats in defense industry
Interpol operation leads to major arrests, while new update improves BitLocker and adds Sysmon tool
Experts say current metrics don't help directors govern risk effectively
Companies must reassess compliance and risk management as AI-powered threats intensify
Critical vulnerabilities in Serv-U file transfer server spark urgent patch alert
VMware has released patches for several vulnerabilities, including a critical command injection flaw, in its Aria Operations and other products, with no evidence of exploitation so far.
Financially motivated threat group targets logistics operators in US and Europe
Recent incidents highlight growing concerns over data security and the importance of robust defenses
From VPNs and Zero Trust to Data Breaches and Bug Fixes
Hackers target Kubernetes clusters, Crunchyroll user data, and Docker repositories in recent attacks
Recent Developments in AI, Phishing, and Data Breaches Redefine the Security Landscape
As AI agents become more prevalent, security experts are sounding the alarm on the potential risks, from credential theft to malicious commands hidden in plain sight.
A surge in sophisticated cyberattacks targets open-source repositories, cybersecurity firms, and critical infrastructure, prompting calls for enhanced security measures.
Recent incidents highlight vulnerabilities in data protection and perimeter security
Malware authors adapt, threat intelligence improves, and Microsoft boosts security updates
Recent attacks highlight the growing role of AI in cybersecurity and the need for adaptive defense strategies
Latest security updates address zero-day exploits, while Microsoft Entra passkeys promise phishing-resistant authentication
The cybersecurity landscape is undergoing a significant transformation, driven by the increasing adoption of artificial intelligence (AI) and machine learning (ML) technologies.
Attackers can now infiltrate and take control of a network in just 29 minutes, according to a new report by CrowdStrike, highlighting the growing threat of sophisticated cyberattacks.
Cybercriminals are using increasingly sophisticated tactics to target businesses, from business email compromise (BEC) scams to ransomware attacks and exploiting endpoint vulnerabilities.