The firm confirmed that a “small number” of attorney email accounts were accessed, but there was "no evidence" that ...
Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy ...
Widely available artificial intelligence systems can be used to deliberately insert hard-to-detect security vulnerabilities ...
Williams & Connolly, one of the nation’s most prominent law firms, told clients that its computer systems had been ...
A cybercrime gang tracked as Storm-2657 has been targeting university employees in the United States to hijack salary ...
A US bank is notifying its customers of a cybersecurity incident that potentially exposed personally identifying information.
Hackers have infiltrated the systems of a software company, potentially compromising the personal data of hundreds of ...
The hackers, known as UNC5221, spy on emails and collect technical information to discover software vulnerabilities, allowing ...
A group known as UAC-0245 launched a new campaign late last month targeting the Ukrainian government and defense organizations by using XLL files ...
An unidentified hacker stole sensitive data from Customs and Border Protection and Federal Emergency Management Agency ...
Earlier this year, two hackers broke into one machine and discovered something wild. It wasn’t just some random server. It belonged to a cyber-operative linked to North Korea’s espionage apparatus.