The lines between digital and physical realms increasingly blur. While this opens countless opportunities for businesses, it also brings numerous challenges. In our...
Nov 29, 2024Ravie LakshmananCorporate Espionage / National Security
A 59-year-old U.S. citizen who immigrated from the People's Republic of China (PRC) has been sentenced...
Nov 28, 2024Ravie LakshmananIoT Security / Vulnerability
Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some...
Nov 28, 2024Ravie LakshmananSoftware Security / Data Breach
Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a...
Nov 28, 2024Ravie LakshmananWindows Security / Cryptomining
A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader...
Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage
U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate...
Nov 27, 2024Ravie LakshmananVulnerability / Software Security
A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in...
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security....