Read about the "Ghost" ransomware, which kinds of organizations it has been used against and the purpose behind the attacks.
Cybercriminal groups using the Ghost ransomware variant have so far successfully breached organizations in more than 70 ...
FAYETTEVILLE, N.C., Feb. 20, 2025 (GLOBE NEWSWIRE) -- Four-Star General and Commander of U.S. Cyber Command (USCYBERCOM) Timothy Haugh visited Fayetteville State University (FSU) to explore its ...
These widespread attacks target outdated versions of software and firmware on internet facing assets.
CISA and the FBI warn organizations of attacks employing the Ghost (Cring) ransomware, operated by Chinese hackers.
Also known as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada and Rapture, the financially motivated group is ...
In its crusade against federal agencies, the Trump administration is targeting our election system, making potentially dangerous reductions to protections that help keep elections free, fair, and ...
Mohit Yadav, a cybersecurity leader at Hilton Worldwide, won a 2025 Global Recognition Award for advancing artificial ...
President Donald Trump's administration has disbanded an FBI task force focused on investigating foreign influence campaigns ...
CISA has issued a new alert about buffer overflow vulnerabilities, urging the software industry to adopt proper programming practices to eliminate an entire class of dangerous ...
In the fall, the worst telecommunications hack in US history was discovered. The attackers have not yet been stopped, quite ...
OTORIO, a leading provider of OT cybersecurity solutions, has introduced the CSAV (Compensating Scoring for Asset ...