Browsing: #DataProtection
hacker newsApril 7, 2026SaaS Security / Enterprise Security The rapidly evolving threat landscape of 2026 has revealed a frustrating paradox…
When we talk about credential security, the focus is usually on preventing breaches. This makes sense, as IBM’s 2025 Cost…
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that can be exploited to escalate…
Ravi LakshmananApril 7, 2026Vulnerability/Threat Intelligence China-based threat actors known for deploying Medusa ransomware are said to be involved in weaponizing…
Ravi LakshmananApril 7, 2026Artificial intelligence/vulnerabilities Threat actors are exploiting maximum-severity security flaws in Flowise, an open-source artificial intelligence (AI) platform,…
As conflict continues in the Middle East, Iranian-linked attackers are suspected to be behind a password dissemination campaign targeting Microsoft…
Ravi LakshmananApril 6, 2026Malware/Threat Intelligence Threat actors believed to be affiliated with the Democratic People’s Republic of Korea (DPRK) have…
The attack surface no longer exists on a single operating system, nor are the campaigns targeting it. In enterprise environments,…
Ravie LakshmananApr 06, 2026Cybersecurity / Hacking This week had real hits. The key software got tampered with. Active bugs showed up in the…
The most active enterprise infrastructure within a company is the developer workstation. That laptop is where credentials are created, tested,…