Italy faces DDOS attacks from Russia

On Saturday, a series of sophisticated cyberattacks hit nine Italian government websites, causing disruptions across several key digital platforms. Among the affected sites were...
Ransomware Attack

Top Law Enforcement Operations in Cybersecurity in 2024: A Year of Major Strikes Against...

In 2024, law enforcement agencies worldwide ramped up their efforts to combat cybercrime, leading to a series of high-profile operations aimed at disrupting the...

Google trending Cybersecurity headlines for the last weekend

Space Bears Ransomware Targets Atos SE in Major CyberattackAtos SE, the France-based global leader in cloud computing and cybersecurity services, has confirmed a major...
Cybersecurity Products

New Report: Attack Surface Challenges Behind 80% of Cybersecurity Breaches

Over 80% of cyber breaches result from external threat actors conducting phishing, session hijacking, account takeover, and ransomware attacks, putting organizations under mounting pressure...

Volkswagen data breach of Electric cars and D Link router botnet attack

Volkswagen Data Leak Exposes Information of Over 800,000 Electric Vehicle Owners Volkswagen (VW), one of the most well-known automobile manufacturers in the world, has become...

Hacking Tug-of-War: China Accuses the USA for launching cyber attacks on its Technology Infrastructure

In recent weeks, the landscape of online espionage has shifted dramatically. For years, Western governments and companies have openly accused China of orchestrating cyber...

Clop Ransomware Gang Targets Cleo File Transfer Service and threatens to expose Sensitive Data

The infamous Clop Ransomware gang has once again made headlines by successfully breaching the servers of Cleo, a well-known provider of file transfer software....
Cybersecurity Products

Cloud Security Trends Survey: Best Practices for Securing Multi-Cloud Environments

Companies are increasingly pursuing a cloud-first strategy by developing and deploying applications with the cloud in mind. With the majority of organizations adopting a...

How Modern SecOps Teams Use CTEM to Assess and Reduce Cyber Threats

Gartner created the Continuous Threat Exposure Management (CTEM) framework as a strategic approach to help organizations of all sizes and maturity levels address modern...