Akira and Fog ransomware now exploit critical Veeam RCE flaw
Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup…
Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup…
Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned…
Achieving cybersecurity compliance is often seen as a regulatory necessity, primary to avoid hefty fines and legal repercussions. However, the…
There’s an unnerving secret many of us in cybersecurity have noticed. And if you think your company is “too small”…
CVE-2024-44204 is one of two new Apple iOS security vulnerabilities that showcase an unexpected coming together of privacy snafus and…
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other…
Generative AI is being used to make cyberscams more believable. Here's how organizations can counter that using newly emerging tools…
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds…
As businesses enter the third quarter of 2024, they need to contend with three new state privacy laws. The Texas…
On July 3rd the period for public comment closed for the U.S. Cybersecurity and Infrastructure Security Agency’s proposed Cyber Incident…