Private 5G: New Possibilities — and Potential Pitfalls

While ushering in "great operational value" for organizations, private 5G…

Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware

Cybersecurity researchers are warning of a new phishing campaign that's…

The Cyber Future Is Riskier Than You Think

Sound suggestions on how to tackle four "quiet problems" that…

Operation Endgame: Do Takedowns and Arrests Matter?

Cybercrime response needs more aggressive actions from those seeking to…

Security, risk and compliance in the world of AI agents

AI agents are rapidly becoming foundational to enterprise operations. Whether…

FDA’s Critical Role in Keeping Medical Devices Secure

The FDA's regulations and guidance aim to strike a balance…

Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira Credentials 

Luxury automotive manufacturer Jaguar Land Rover (JLR) has become the…

CISA Warns of Apple WebKit Out-of-Bounds Write Vulnerability Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about…

Schluss mit schlechter Software

Softwaresicherheit beginnt beim Hersteller – nicht beim Nutzer. Pingingz –…

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following…

China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks

The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, […]