IT Information Security

Embargo Ransomware nets $34.2M in crypto since April 2024

Embargo ransomware, likely a BlackCat/Alphv successor, has netted $34.2M in crypto since mid-2024, researchers say. The Embargo ransomware group has…

6 months ago

<gwmw style="display: none; background-color: transparent;"></gwmw>Germany limits police spyware use to serious crimes<gwmw style="display: none; background-color: transparent;"></gwmw>

Germany’s top court ruled police can use spyware only for crimes punishable by at least three years in prison. Germany’s…

6 months ago

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

Bouygues Telecom suffered a cyberattack that compromised the personal information of 6.4 million customers. French telecommunications company Bouygues Telecom suffered…

6 months ago

Columbia University data breach impacted 868,969 people

Columbia University was hit by a cyberattack, exposing personal data of over 860,000 students, applicants, and employees. Columbia University suffered…

6 months ago

SonicWall dismisses zero-day fears after Ransomware probe

SonicWall found no evidence of a new vulnerability after probing reports of a zero-day used in ransomware attacks. SonicWall investigated…

6 months ago

Air France and KLM disclosed data breaches following the hack of a third-party platform

Air France and KLM warn of a data breach exposing customer data via unauthorized access to a third-party platform. Air…

6 months ago

Microsoft unveils Project Ire: AI that autonomously detects malware

Microsoft’s Project Ire uses AI to autonomously reverse engineer and classify software as malicious or benign. Microsoft announced Project Ire,…

6 months ago

CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector

Ukraine's CERT-UA warns of phishing attacks by UAC-0099 targeting defense sectors, using malware like MATCHBOIL, MATCHWOK, and DRAGSTARE. Ukraine's CERT-UA…

6 months ago

Over 100 Dell models exposed to critical ControlVault3 firmware bugs

ReVault flaws in Dell ControlVault3 firmware allow firmware implants and Windows login bypass on 100+ laptop models via physical access.…

6 months ago

How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments

CTEM is a continuous strategy that assesses risk from an attacker’s view, helping orgs prioritize threats across cloud and hybrid…

6 months ago

This website uses cookies.