The breach was detected in late 2025 when unusual activity was observed on the MonLogicielMedical (MLM) product,...
Uncategorized
Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under...
The extortion attempt began with emails sent from addresses appearing to be associated with HungerRush, warning the...
The agents are not just software – they are autonomous systems that require lifecycle security.
Some weeks in cybersecurity feel routine. This one doesn’t.
Several new developments surfaced over the past few days,...
Most organizations assume encrypted data is safe.
But many attackers are already preparing for a future where today’s...
A suspected Iran-nexus threat actor has been attributed to a campaign targeting government officials in Iraq by...
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access...
Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with...
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential...