Tallahassee Memorial HealthCare (TMH) has taken its IT systems offline and suspended non-emergency procedures following a late Thursday cyberattack. While all its network systems were taken...
Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution...
While the week started slowly, it turned into a big ransomware mess, with attacks striking a big blow at businesses running VMware ESXi servers. The attacks...
The New York attorney general’s office has announced a $410,000 fine for a stalkerware developer who used 16 companies to promote surveillance tools illegally. Stalkerware (or...
The attacks, allegedly conducted by Russian-based adversaries, occurred during August and September 2022, potentially exposing sensitive U.S. scientific research. In the wake of a series of...
Cyber attacks can undermine space-based capabilities, Gen. Chance Saltzman said. Attacks on ground networks can be “backdoor” assaults on the space-based capabilities that are key to...
The Defense Department’s Office of Inspector General points out longstanding unmet requests in a report rounding up recent cybersecurity oversight. The Department of Defense has open...
Security analysis tool Binwalk itself poses a security risk to users running out-of-date versions due to a path traversal vulnerability that could lead to remote code...
When it comes to attacks against application programming interfaces (APIs), the building blocks that provide access to many of our applications, the OWASP API Top Ten is seen...
Operators of high-yielding investment scams known as “pig butchering” have found a way to bypass the defenses in Google Play and Apple’s App Store, the official...