PwC Announces Addition of Morgan Adamski to Leadership of Cyber, Data & Technology Risk Platform – Dark Reading
Post Content – Read More
Post Content – Read More
Post Content – Read More
Post Content – Read More
While no data has yet to be misused, the university doesn’t rule out the possibility of that occurring in the future, prompting it to warn affected individuals to remain vigilant…
Security is everyone’s responsibility, but as a CISO, it starts with you. – Read More
The tranche of information includes data on recent campaigns, attack tools, compromised credentials, and command files used by a threat actor believed to be acting on behalf of China or…
A whole criminal ecosystem revolves around scamming users out of their crypto assets, but malicious — or vulnerable — smart contracts could be used against businesses as well. – Read…
Silver Fox is the Hannah Montana of Chinese threat actors, effortlessly swapping between petty criminal and nation-state-type attacks. – Read More
While no sensitive financial data like credit card information was compromised, the threat actors were able to get away with names, email addresses, phone numbers, and more. – Read More
A software developer discovered a way to abuse an undocumented protocol in Amazon’s Elastic Container Service to escalate privileges, cross boundaries and gain access to other cloud resources. – Read…
As part of their plea deal, the cybercriminal founders will also have to forfeit more than $200 million. – Read More
Citizen Lab director and founder Ron Deibert explained how civil society is locked in “vicious cycle,” and human rights are being abused as a result, covering Israeli spyware, the Khashoggi…
In 2024, it was Snowflake. In 2025, it’s Salesforce. ShinyHunters is back, with low-tech hacks that nonetheless manage to bring down international megaliths like Google, Cisco, and Adidas. – Read…
With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity. – Read More
The fashion house is added to a list of other companies that have been impacted by similar breaches, including Tiffany & Co. and Louis Vuitton. – Read More