2 min read
Apple issues spyware warnings to high-risk users in ongoing zero-day attacks
A new wave of threat notifications indicated targeted spyware campaigns affecting Apple users across multiple countries.
2 min read
A new wave of threat notifications indicated targeted spyware campaigns affecting Apple users across multiple countries.
2 min read
On September 23, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) issued an alert about a widespread supply chain compromise...
2 min read
The Washington-based provider will stop using Meta Pixel for at least two years and offer privacy tool subscriptions as part of the settlement.
2 min read
The genetic testing firm has increased its proposed US settlement following a 2023 credential stuffing breach affecting millions.
1 min read
A federal watchdog has warned that the U.S. Department of Health and Human Services must urgently act on decades-old cybersecurity and IT...
2 min read
An open server tied to three popular generative AI apps has exposed sensitive data from potentially millions of users.
2 min read
The 2023 breach exposed sensitive patient data; affected individuals may now claim credit monitoring and compensation.
2 min read
A coordinated cyberattack exploited OAuth tokens linked to Salesforce, exposing hundreds of companies to data compromise.
2 min read
On September 12, 2025, the FBI released an alert warning about two cybercriminal groups, UNC6040 and UNC6395, that have been targeting organizations’...
2 min read
A threat group’s claims led Google to confirm that its Law Enforcement Request System had been misused, though no data was compromised.
2 min read
Patients and employees affected by a 2023 ransomware attack can now claim compensation or credit monitoring as part of a court-approved settlement.
2 min read
On September 16, 2025, Tina Freese Decker, the American Hospital Association (AHA) Board Chair and president and CEO of Corewell Health in Michigan,...
2 min read
A newly discovered Outlook backdoor is being used by Russian hackers to quietly exfiltrate data and run commands in high-profile cyber-espionage...