A ransomware attack on Synnovis has disrupted pathology services at major London hospitals, affecting patient care and prompting an urgent response from NHS...
Discover how threat actors are leveraging fake browser updates to deploy BitRAT and Lumma Stealer malware, as eSentire’s Threat Response Unit (TRU) uncovers...
LilacSquid, a new cyber espionage threat actor, is targeting the IT, energy, and pharma sectors globally. It uses advanced tools like MeshAgent and PurpleInk...
An attack campaign targeting cryptocurrency users has come to light. Cybercriminals cleverly combined two trusted platforms, the Python Package Index (PyPI)...
The U.S. government has sanctioned entities related to a proxy botnet operation that used free VPN services. Find out more about the campaign and details about...
Discover why AI is essential for improving cybersecurity and productivity in today’s landscape The post Harnessing AI for Enhanced Cybersecurity and...
Learn how to create a robust security framework for sensitive patient data in a remote environment. The post Navigating Data Breaches in Healthcare: The Six...
A hack on spyware app pcTattletale potentially exposed victim data. The company’s website was defaced, and internal files containing stolen information may...
Rockwell Automation has issued an urgent advisory for administrators to disconnect all ICS devices not designed for online exposure from the Internet due to...
Discover the hidden vulnerabilities within SaaS ecosystems and fortify your defenses. The post Best Practices to Enhance SaaS Security and Safeguard Digital...
Learn how to protect healthcare data from breaches with robust third-party risk management strategies. The post Critical Tips to Reduce Third-party Risk in...