1 min read
Linux malware campaign exploits malicious RAR filenames
Linux users are being targeted by a novel phishing campaign that uses malicious filenames in RAR archives to install the open-source VShell backdoor...
1 min read
Linux users are being targeted by a novel phishing campaign that uses malicious filenames in RAR archives to install the open-source VShell backdoor...
2 min read
A class action lawsuit over unauthorized data sharing through web tracking tools has led to a settlement impacting over 313,000 individuals.
2 min read
Colorado has enacted Senate Bill 25-276, establishing new requirements for healthcare facilities that receive state funding, including restrictions...
2 min read
Aflac is under pressure from U.S. lawmakers to disclose more about a data breach that compromised personal and health information.
2 min read
A new Discord-focused scraping tool claims to index billions of user messages, voice chats, and files for sale on a popular leak forum.
3 min read
Texas enacted S.B. 1188 on June 20, joining only a handful of states that regulate artificial intelligence and data offshoring restrictions directly....
2 min read
The Cybersecurity Information Sharing Act of 2015expires on September 30, 2025, potentially removing legal protections that enable healthcare...
2 min read
On August 15, 2025, the City of Columbus, Ohio, the City of Madison, Wisconsin, and Doctors for America filed a Notice of Appeal in the case Carmen...
2 min read
Cybersecurity teams are warning Windows users of a new wave of infections delivered through deceptive LNK files that appear harmless but silently...
2 min read
Attackers are exploiting Cisco’s reputational trust, weaponizing Safe Links to disguise phishing attacks. The result is malicious links passing deep...
2 min read
In August 2024, the Alera Group, the company responsible for administering healthcare benefits for Ulster County government employees, experienced a...
2 min read
An eight-month study at a U.S. healthcare organization shows that traditional training has little effect on stopping phishing attacks.
2 min read
Cybercriminals have developed a phishing technique that uses legitimate Microsoft Office.com links combined with Active Directory Federation Services...