Russia’s Priorities in Prisoner Swap Suggest Cyber Focus
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part…
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part…
Introduction Operational Technology (OT) devices, integral in controlling and monitoring industrial processes, have become prime targets for cyberattacks. Since late…
Cybersecurity startup Knostic, a finalists in this year's Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses…
Cybersecurity startup LeakSignal, a finalists in this year's Black Hat USA Startup Spotlight competition, helps organizations see where data is…
Data security and consumer trust go hand-in-hand in our evolving digital world There’s no doubt that data is a catalyst…
The runaway success of an upstart ransomware outfit called "Dark Angels" may well influence the cyberattack landscape for years to…
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and…
Threat actors uploaded malicious Python packages to the PyPI repository and promoted them through the StackExchange online question and answer platform. [...]
In an alarming revelation, Kaiser Foundation Health Plan reported a data breach impacting over 13 million individuals. For years, there…
The security vulnerabilities, CVE-2024-37394, CVE-2024-37395, and CVE-2024-37396, could lay open proprietary and sensitive research to data thieves.