Cybercrime forums are evolving to include more mature dispute resolution and arbitration procedures which are in some ways comparable to legitimate courts. A recent blog post by...
Opioid treatment network Behavioral Health Group suffered a cyberattack that led to an almost week-long disruption of IT systems and patient care. Behavioral Health Group (BHG)...
The info-stealing malware TinyNuke has re-emerged in a new campaign targeting French users with invoice-themed lures in emails sent to corporate addresses and individuals working in manufacturing,...
In May 2021, a set of five vulnerabilities in Dell computer drivers collectively tracked as CVE-2021-21551 was disclosed and fixed after it remained exploitable for 12 years. However,...
The three sectors paying the highest prices for cyber insurance all fall into the finance industry, according to a new study from AdvisorSmith. The business insurance...
Threat actors are actively exploiting a critical security flaw in Java logging library Apache Log4j. Log4j is an open-source, Java-based logging utility widely used by enterprise...
Public and private entities in the United Kingdom have connected in support of the National Cyber Resilience Centre Group (NCRCG), a not-for-profit company bringing together all...
Computer chip giant Intel has launched a bug bounty program with Belgium-based Intigriti, after switching from rival, US-based ethical hacking platform HackerOne. Intel is applying a 12-month bonus...
A high-severity vulnerability in several cardiac healthcare devices could allow attackers to access privileged accounts without a password and seize control of the devices. The authentication bypass flaw...
A local privilege escalation security vulnerability could allow attackers to gain root access on Ubuntu systems by exploiting a double-free memory corruption bug in GNOME’s AccountsService...