Nobelium, notorious for the SolarWinds breach in 2020, has once again demonstrated its capability to infiltrate high-profile targets. The SolarWinds incident, one of the most consequential ...
A significant vulnerability has been uncovered in Samsung smartphones, linked to the Monkey’s Audio (APE) decoder. The flaw, now resolved, was identified as CVE-2024-49415, carrying a CVSS score of ...
With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than ever before (on-premises and in the cloud), ...
From data leaks and cybersecurity incidents enabled by careless users to the malicious theft of intellectual property (IP) or even workplace violence, insider threats continue to pose a significant ...
Data breaches within the healthcare sector in the United States are becoming an alarmingly frequent occurrence, and it’s a trend that demands our attention. According to a recent survey, one in every ...
Apple sues company known for hacking iPhones on behalf of governments. An Israeli firm called NSO Group, provided software to government agencies and law enforcement that enables them to hack iPhones ...
A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi, a researcher at Italian cybersecurity ...
As borders become irrelevant through remotely-launched attacks, the geopolitical landscape is rapidly growing in complexity and changing how countries define national security. This trend is expected ...
The healthcare and life sciences industry continues to be plagued by cybersecurity threats. 1 According to FTI Consulting’s U.S. Healthcare & Life Sciences Industry Outlook 2023 survey, 70 percent of ...
The recent discovery and exploitation of CVE-2023-4966, a significant vulnerability in Citrix NetScaler Gateway and ADC devices, underscores the critical importance of cybersecurity vigilance.
The data from this study was taken from the Surfshark Alert (a data breach detection tool) database, which comprises all publicly available breached data sets to inform our users of potential threats.
In a recent release, Microsoft has provided an extensive analysis of a relatively obscure yet highly dangerous threat actor. In their report, Microsoft has designated this group as “Octo Tempest.” ...