Application securityGoogle settles nearly $1.4B Texas case for collecting personal dataShaun NicholsMay 12, 2025Settlement is the largest individual penalty to date against Google in the state of Texas.
IdentityApril 2025 Ascension Health breach affected 437,329, reports HHSSteve ZurierMay 12, 2025Recent attack points out the need for all organizations to refocus on third-party bugs and identity management.
Threat IntelligenceMalicious .NET files conceal RATs in bitmap imagesLaura FrenchMay 9, 2025A recent malspam campaign revealed a payload nested within two .NET assemblies.
Threat IntelligenceGoogle warns of Russian hackers ColdRiver wielding new malware toolsShaun NicholsMay 9, 2025The ColdRiver group has been spotted using a previously unknown piece of malware designated as “LostKeys.”
Vulnerability ManagementSAP NetWeaver bug exploited since January, allows RCESteve ZurierMay 9, 2025Remote code execution possible of SAP NetWeaver Visual Composer flaw rated 10.0.
Network SecurityAttacks surge against antiquated routers, FBI warnsShaun NicholsMay 8, 2025Increase in attacks using malware known as “TheMoon" seen, says FBI.
Vulnerability ManagementCisco patches maximum severity vulnerability in IOS XE SoftwareLaura FrenchMay 8, 2025A hard-coded JSON Web Token could allow a remote attacker to upload files with root privileges.
RansomwareDouble-extortion tactics used in PowerSchool ransomware attackSteve ZurierMay 8, 2025Cloud provider paid a ransom. Its school district customers are now being extorted.
IdentityNorth Korean hackers show telltale signs, researchers sayShaun NicholsMay 8, 2025North Korean groups give away their intentions with common blunders and activity patterns.
RansomwareMost cyber insurance claims stem from BEC, fraud, report saysLaura FrenchMay 7, 2025The Coalition 2025 Cyber Claims Report revealed an increase in severity of BEC losses in 2024.