Cyberattack
Learn why many company networks are vulnerable to ransomware installed through common remote access tools used by employees.
Read how the MatrixPDF toolkit transforms ordinary PDFs into phishing tools that evade security and deliver malware or credential theft schemes.
Discover why healthcare cyberattacks are escalating as AI gives threat actors an edge, leaving hospitals and clinics struggling to keep pace with defense measures.
Read about the ChatGPT vulnerability that exposes enterprises to covert zero-click attacks, compromising sensitive data through autonomous AI agents.
Learn about the billions lost to cyberattacks among Europe’s largest economies, and how insurance adoption could sharply reduce future financial exposure.
Discover how the Cybersecurity and Infrastructure Security Agency (CISA) exposed a GeoServer vulnerability that allowed attackers to infiltrate a federal agency and evade detection for weeks.
A US Secret Service investigation uncovered an illicit system capable of shutting down the cellular network, raising major risk concerns for national security.
Read how the Shai-Hulud worm underscores growing supply chain attack threats, demanding urgent risk management, legal, and operational responses.
Learn why the Buterat backdoor malware poses long-term risks to networks by evading detection, hijacking processes, and exfiltrating sensitive data.
Learn how attackers exploit Docker APIs with evolving malware that blocks access, spreads autonomously, and lays groundwork for a complex botnet.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.