Business Email Compromise Scams Evolve, Cost Billions
Sophisticated attacks exploit human trust, with Lazarus Group using new Medusa ransomware
Read latest briefing βπ€ Desk
Cybersecurity, Privacy, Threats and defense
Sophisticated attacks exploit human trust, with Lazarus Group using new Medusa ransomware
Read latest briefing βDesk archive
Experts warn of evolving threats and push for proactive security strategies
Cybersecurity threats expose millions of records, prompt Microsoft to enhance data controls
AI agents are increasingly used in enterprises, but their security risks are often overlooked, while data breaches and cybercrime cases, like the Reddit fine and the movie2k.to trial, highlight the need for better data
A surge in AI-powered cyberattacks and high-profile breaches has left the cybersecurity landscape reeling, with nation-state actors and extortion gangs exploiting vulnerabilities in software and human psychology.
Study finds 64% of CISOs still report to IT, sparking questions about conflict of interest
Threat actors adapt to evasion tactics, while innovative solutions challenge traditional security approaches
A Russian-speaking threat actor is using AI to compromise hundreds of Fortinet firewalls, highlighting the need for basic cybersecurity measures amidst increasing digitalization and industrial connectivity.
Mental health apps, ATMs, and firewalls compromised in recent breaches
Multiple Threats Emerge as CISA Warns of Intune Vulnerability and Cloud Misconfigurations
Recent breaches and attacks expose vulnerabilities in MFA, supply chains, and cloud security
Multiple breaches and attacks expose vulnerabilities in data security and loyalty programs
As the cybersecurity landscape continues to evolve, hackers are turning to new tactics and techniques to evade detection and exploit vulnerabilities.
Experts weigh in on zero trust, vulnerabilities, and award-winning strategies
Recent attacks and advancements in security measures signal a shift in the landscape
Iran-linked hackers claim responsibility for wiper malware attack, while SQLi flaw and RCE vulnerability exploit thousands of sites
Malicious resumΓ©s, exploited flaws, and ransomware attacks target various sectors
A phishing platform takedown, a self-propagating JavaScript worm on Wikipedia, and 48 new Cisco firewall vulnerabilities underscore the ongoing battle for online security.
Hackers exploit WordPress plugin, Phobos ransomware admin pleads guilty, and state-affiliated groups target OT networks
International cooperation leads to arrests and shutdown of major dark web marketplaces
Cisco patches critical firewall flaws as Google reports surge in zero-day exploits and browser security risks
A look at 14 notable software bugs that went undetected for over a decade
A recent data breach at the University of Hawaii Cancer
Drone strikes and cyberattacks have become the new norm in the escalating conflict between Iran and the US-Israeli alliance.