eScan AV supply chain compromise: Users targeted with malicious updates

The update infrastructure for eScan antivirus, a product of Indian cybersecurity company MicroWorld Technologies, has been compromised by unknown attackers to deliver a persistent downloader to enterprise and consumer... Read more »

Druva Threat Watch offers continuous threat monitoring of backup data

Druva announced the launch of Threat Watch, a zero-touch, automated cloud-native solution for proactive threat monitoring of backup data. Threat Watch is designed to continuously scan backup snapshots to... Read more »

France Travail fined €5 million for failing to protect job seeker data

France data protection authority CNIL has fined public employment agency France Travail €5 million for failing to ensure the security of personal data of job seekers. Attackers gained access... Read more »

CTEM in Practice: Prioritization, Validation, and Outcomes That Matter

Cybersecurity teams increasingly want to move beyond looking at threats and vulnerabilities in isolation. It’s not only about what could go wrong (vulnerabilities) or who might attack (threats), but... Read more »

Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity

Here’s a peek at AI assistance, phone-to-PC handoff, accessibility improvements, security fixes, and stability updates. The post Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity appeared... Read more »

RAMP ransomware forum goes dark in probable FBI sting

RAMP, an infamous Russian-speaking cyber crime forum, has gone off the air after an apparent US operation. Read more »

Conditional Access enforcement change coming to Microsoft Entra

Microsoft will change how Conditional Access policies are enforced in Microsoft Entra starting March 27, 2026, with a phased rollout continuing through June 2026. The change affects sign-ins through... Read more »

N-able brings AI to endpoint, security, and recovery

N-able announced enhanced AI capabilities across its platform to help organizations operate securely, efficiently, and resiliently as AI reshapes both cyberthreats and IT complexity. As AI accelerates the speed,... Read more »

Nation-state and criminal actors leverage WinRAR flaw in attacks

Multiple threat actors exploited a now-patched critical WinRAR flaw to gain initial access and deliver various malicious payloads. Google Threat Intelligence Group (GTIG) revealed that multiple threat actors, including... Read more »

ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach

The dataset allegedly includes names, email addresses, postal addresses, phone numbers, and account-related details. The post ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach appeared first on... Read more »
Subscribe to our Newsletter