The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited...
Année : 2023
What Healthcare Cybersecurity Leaders Should Know About the FDA’s Section 524B Guidelines

1 min read
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order...
A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in...
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of...
The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse...
Microsoft is rolling out fixes for known Microsoft 365 issues causing ‘Something Went Wrong [1001]’ sign-in errors...
CISA expects to extend this program to include up to 100 critical infrastructure entities in its first...
A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks...
The former chief operating officer of a cybersecurity company has pleaded guilty to hacking two hospitals, part...