A report from the charity the Cyber Helpline found that 98% of cyber enabled crimes result in no further action from the ...
An infamous ransomware group has claimed to have compromised sensitive data from a children’s hospital in Liverpool, UK. On ...
A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported ...
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 ...
Arun Narasimhan discusses the Connectivity Standards Alliance (CSA)'s efforts to offer a unified approach to IoT security ...
A cyber-attack targeting Japanese and other East Asian organizations, suspected to be orchestrated by the threat group ...
This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation ...
The UK’s Information Commissioner’s Office argues that regulatory concerns shouldn’t prevent firms sharing data to stop scams ...
Running from September 2 to October 31, Operation Serengeti involved authorities across 19 African nations. It targeted ...
The CSO of T-Mobile has clarified that no customer information was stolen by Chinese hacking group Salt Typhoon ...
CrowdStrike has reached a deal to acquire Adaptive Shield, while Cybereason and Trustwave have entered into a definitive ...
A pro-Russian hacktivist collective, CyberVolk, has launched its own ransomware-as-a-service operations, SentinelLabs has ...