The US government has set out proposals to increase security obligations on healthcare providers to protect patient data amid ...
The PlugX worm, often linked to Mustang Panda, can spread through infected flash drives, making it highly pervasive. After ...
DoubleClickjacking bypasses X-Frame-Options and SameSite cookies in double-click sequences, exposing UI authentication flaws ...
The State of Rhode Island has confirmed that cybercriminals have begun publishing data stolen from its social services portal ...
Chinese state-backed hackers have compromised US Treasury computers and accessed unclassified information, after targeting a ...
Security researchers have warned users of Google Chrome extensions to be on their guard after uncovering a major campaign focused on data theft. At least 36 compromised Chrome extensions have been ...
Infosecurity consulted top counter-threat intelligence experts to analyze the tumultuous cyber threat landscape of 2024 and ...
As we look towards 2025, it's clear that the cybersecurity landscape will be characterised by both exciting advancements and ...
Sushila Nair sets out the key areas that should be included to craft an effective cybersecurity budget in 2025 ...
Kevin Curran says 2025 will be a year of reckoning for AI in cybersecurity as people improve their understanding of the ...
A significant number of substantial fines were issued and settlements agreed relating to cybersecurity and data protection ...
Infosecurity has curated a collection of the best tips and guidance from CISOs and cybersecurity professionals we've ...