Attackers accessed email accounts containing Social Security numbers, medical treatment information, and more. A hospital system in West Virginia has suffered a data breach resulting from a phishing...
One of the inactive ransomware families, TellYouThePass, has been revived. It has been discovered carrying out attacks on Windows and Linux systems by leveraging the recently...
Lack of shared recognition of problems increases the pain, according to a new survey. Cybersecurity center leaders and non-IT employees are often at odds as security...
UPDATED Bug bounty hunters have already submitted thousands of vulnerability reports related to the Apache Log4j bug that continues to send shockwaves through the global software ecosystem. Submitted...
A web security flaw in an anti-cheating browser extension created a means to hack into the computers of university students and other users before they were recently patched....
Security vulnerabilities in Microsoft Teams could allow an attacker to spoof link previews, leak IP addresses, and even access internal services. A total of four vulnerabilities...
A three-year-long honeypot experiment featuring simulated low-interaction IoT devices of various types and locations gives a clear idea of why actors target specific devices. More specifically,...
The Department of Homeland Security (DHS) has announced that the ‘Hack DHS’ program is now also open to bug bounty hunters willing to track down DHS...
A man pleaded guilty to fraudulently opening rideshare and delivery service accounts using stolen identity information sold on dark web marketplaces. Flavio Candido da Silva, 36,...
A new Dridex malware phishing campaign is using fake employee termination emails as a lure to open a malicious Excel document, which then trolls the victim...