Cybersecurity At the Crossroads: The Role Of Private Companies In Safeguarding U.S. Critical Infrastructure
In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…
In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…
The Texas Tech University Health Sciences Center and its El Paso counterpart suffered a cyberattack that disrupted computer systems and…
A large-scale malvertising campaign distributed the Lumma Stealer info-stealing malware through fake CAPTCHA verification pages that prompt users to run…
The sector must prioritize comprehensive data protection strategies to safeguard PII in an aggressive threat environment.
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits…
Automobile parts giant LKQ Corporation disclosed that one of its business units in Canada was hacked, allowing threat actors to…
PRESS RELEASE BOSTON — December 12, 2024 — Zerto, a Hewlett Packard Enterprise company, today announced the...
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other…
CISA confirmed today that a critical remote code execution bug in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited…
Cleo has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software, currently exploited in data theft…