The Information Commissioner’s Office is now investigating how TikTok uses 13–17-year-olds’ personal information ...
Threat actors are exploiting a zero-day bug in Paragon Partition Manager's BioNTdrv.sys driver during ransomware attacks ...
The US Cybersecurity and Infrastructure Security Agency confirmed it will keep defending against Russian cyber threats to US ...
Phishing attack exploits social engineering techniques alongside Microsoft Teams and remote access software to deploy ...
A new phishing campaign has been identified using Havoc to control infected systems, leveraging SharePoint and Microsoft ...
Jill Knesek, CISO at BlackLine, emphasizes the importance of the human element and executive collaboration in a modern ...
Telecoms provider Vodafone has developed the new proof of concept with IBM, as it seeks to implement post-quantum ...
A joint operation between the Thai and Singapore police has resulted in the arrest of a man allegedly responsible for over 90 ...
Four in ten flaws exploited by threat actors in 2024 were from 2020 or earlier, with some dating back to the 1990s, according ...
SolarWinds announced the completion of its acquisition by Turn/River Capital on February 7 for a total enterprise value of $4 ...
Every January, we start the year with news of record-breaking attempted cyberattacks, and 2025 has been no different.
The Open Source Project Security (OSPS) Baseline outlines the various tasks, processes, artifacts and configurations that ...