Healthcare Sector Charts 2 More Ransomware Attacks

Two healthcare institutions, Frederick Health and New York Blood Center Enterprises (NYBCe), are grappling with disruptions from separate ransomware attacks ...
Read more
Doppler announces integration with Datadog to streamline security and monitoring

San Francisco, United States / California, January 30th, 2025, CyberNewsWire Doppler, the leading provider of secrets management solutions, announced a ...
Read more
Fake Videos of Former First Lady Scam Namibians

Scammers are using the likeness of Namibia’s former first lady to trick people into falling for investment scams. For some ...
Read more
DeepSeek AI data under scrutiny as Microsoft investigates OpenAI data steal

DeepSeek AI, a Chinese chatbot service that recently gained traction on the Apple App Store, is now in the spotlight ...
Read more
Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws

Yet another Mirai botnet variant is making the rounds, this time offering distributed denial-of-service (DDoS) as-a-service by exploiting flaws in ...
Read more
Mishing Cyber Attack from malicious PDF

In recent years, we’ve witnessed the rise of phishing attacks, where cybercriminals trick victims into clicking on malicious web links ...
Read more
Lynx Ransomware Group Adds Affiliates to ‘Industrialize’

NEWS BRIEF The Lynx ransomware-as-a-service (RaaS) group has made a name for itself, standing out as a “highly organized platform” ...
Read more
Broadcom offers adapters with secure data encryption

Broadcom, a leader in semiconductors and networking equipment, has launched its latest innovation: the Emulex Secure Fibre Channel Host Bus ...
Read more
For $50, Attackers Can Use GhostGPT to Write Malicious Code

A recently debuted AI chatbot dubbed GhostGPT has given aspiring and active cybercriminals a handy new tool for developing malware, ...
Read more
Empower individuals to control their biometric data: the new challenge across all sectors

What if your face, fingerprint, or iris was your greatest vulnerability in a cyberattack? All those parts of you that ...
Read more