News

Security researchers uncovered a previously unseen malware cluster associated with Israeli spyware maker Candiru. The company ...
Hackers are actively exploiting years-old flaws in obsolete Wi-Fi cameras and video recorders made by D-Link, warn U.S.
Technology giants Google and Cisco separately said they've both suffered recent data breaches after attackers socially ...
Chinese nation-state hackers penetrated mobile telecom networks across Southeast Asia likely in order to track individuals' ...
In this week's update, four ISMG editors discussed the latest on the ToolShell exploit and the rise of Warlock ransomware, why IT-OT integration may not be the best ...
Did China sneak a peak into ToolShell? ToolShell hacking in South Africa. Cisco flaws. Arizona woman sentenced for aiding ...
In today’s fast-changing threat landscape, operational technology (OT) resilience is no longer optional. It’s essential. Join this session to learn how to align OT operations with latest compliance ...
Critical Flaws Unauthenticated attackers could remotely hijack Dahua Hero C1 smart cameras by exploiting firmware ...
Palo Alto Networks announced the biggest deal in its 21-year history, bursting into the identity security market with its $25 ...
Article Machine Identities: The Invisible Security Frontier Tom Field • May 30, 2025 AI-driven operations are accelerating, leaving organizations with a critical blind spot: machine identities. Brian ...
A Missouri healthcare system has agreed to pay up to $9.25 million to settle a proposed class action lawsuit alleging that ...