New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
Dec 31, 2024Ravie LakshmananData Security / Privacy The U.S. Department of Justice…
New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
Dec 30, 2025Ravie LakshmananCybersecurity / Compliance The United States Department of Health…
Top 10 Cybersecurity Trends to Expect in 2025
The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats,…
Rockstar2FA Collapse Fuels Expansion of FlowerStorm Phishing-as-a-Service
Dec 23, 2024Ravie LakshmananPhishing / Cybercrime An interruption to the phishing-as-a-service (PhaaS)…
CVSS 10.0 Flaw Enables RCE via Unsafe Serialization
Dec 27, 2024Ravie LakshmananVulnerability / Software Security The Apache Software Foundation (ASF)…
FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
Dec 27, 2024Ravie LakshmananBotnet / DDoS Attack Cybersecurity researchers are warning about…
15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials
Dec 28, 2024Ravie LakshmananVulnerability / Threat Intelligence A high-severity flaw impacting select…
Over 80% of Targets Found in Russia
Dec 27, 2024Ravie LakshmananCyber Attack / Data Theft The threat actor known…
North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign
Dec 27, 2024Ravie LakshmananCryptocurrency / Cyber Espionage North Korean threat actors behind…


