A threat actor had access to electronic patient record system of an unnamed French hospital, and the health data of…
Decade-old flaws in the needrestart package in Ubuntu Server could allow local attackers to gain root privileges without user interaction.…
Ford investigates a data breach linked to a third-party supplier and pointed out that its systems and customer data were…
A hacker allegedly accessed a file containing testimony from a woman claiming she had sex with Matt Gaetz when she…
Apple released security updates for iOS, iPadOS, macOS, visionOS, and Safari browser to address two actively exploited zero-day flaws. Apple…
Threat actors exploit misconfigured JupyterLab and Jupyter Notebooks servers to rip sports streams and illegally redistribute them. Researchers from security…
Russian Phobos ransomware operator Evgenii Ptitsyn, accused of managing attacks, was extradited from South Korea to the US to face…
Chinese threat actors use custom post-exploitation toolkit 'DeepData' to exploit FortiClient VPN zero-day and steal credentials. Volexity researchers discovered a…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Progress Kemp LoadMaster, Palo Alto Networks PAN-OS and Expedition bugs to its Known…
A ransomware attack on Great Plains Regional Medical Center compromised personal data of 133,000 individuals, exposing sensitive information. On September…
This website uses cookies.