News

CISA warns that RESURGE malware can be dormant on Ivanti devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious imp...
News

Third-Party Patching and the Business Footprint We All Share

When security teams talk about attack surface, the conversation usually starts in familiar places. Servers, identity sys...
News

Ukrainian man pleads guilty to running AI-powered fake ID site

A Ukrainian man has pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold more than 10,000...
News

Previously harmless Google API keys now expose Gemini AI data

Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemi...
News

Trend Micro warns of critical Apex One code execution flaws

Japanese cybersecurity software firm Trend Micro has patched two critical Apex One vulnerabilities that allow attackers ...
News

European DYI chain ManoMano data breach impacts 38 million customers

DIY store chain ManoMano is notifying customers of a data breach that was caused by hackers compromising a third-party s...
News

Critical Juniper Networks PTX flaw allows full router takeover

A critical vulnerability in the Junos OS Evolved network operating system running on PTX Series routers from Juniper Net...
News

Olympique Marseille confirms ‘attempted’ cyberattack after data leak

French professional football club Olympique de Marseille has confirmed a cyberattack after a threat actor claimed on Mon...
News

Ransomware payment rate drops to record low as attacks surge

The number of ransomware victims paying threat actors has dropped to 28% last year, an all-time low, despite a significa...