Compromised AWS Keys Abused in Codefinger Ransomware Attacks

A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets…

Palo Alto Networks Patches Firewall Zero-Day Exploited for DoS Attacks

Palo Alto Networks informed customers late last week that it has patched a zero-day vulnerability that…

HubPhish Abuses HubSpot Tools to Target 20,000 European Users for Credential Theft

Cybersecurity researchers have disclosed a new phishing campaign that has targeted European companies with an aim…

22,000 IPs Taken Down in Global Cybercrime Crackdown

More than 22,000 IP addresses linked to phishing, infostealer, and ransomware attacks were taken down in…

CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by the…

Channel Women In Security: Understanding Risk In Digital Security

In the first episode of Channel Women in Security, Cass Cooper speaks with Rosanna Filingeri, Vice…

Ransomware Hits Critical Infrastructure Hard, Costs Adding Up

The financial impact of a cyberattack targeting a cyber-physical system (CPS) can reach up to $1…

Researcher Says Healthcare Facility’s Doors Hackable for Over a Year

A researcher says a US healthcare facility has failed to address a serious vulnerability that has…

Akamai Joins the Streaming Video Technology Alliance

Akamai (NASDAQ: AKAM), the cloud company that powers and protects life online, announced today that it has…

Staying Ahead Of Cyberthreats: Fortinet’s Secure Networking Solutions

In today’s rapidly evolving digital landscape, business are facing unprecedented challenges in securing their digital spaces.…