Intel

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Food and Drug Administration (FDA), have raised alarms about a critical vulnerability in Contec's CMS8000 patient monitors. This vulnerability involves a hardcoded password in the device firmware, representing a significant cybersecurity threat to healthcare infrastructures. Understanding

A significant spyware campaign orchestrated by the Israeli company Paragon has recently been uncovered by WhatsApp, impacting 90 individuals including journalists and members of civil society. The affected users have been notified directly by the platform. Details of the Spyware Campaign The Meta-owned WhatsApp platform identified that around 90 individuals,

Broadcom has patched a series of significant vulnerabilities in VMware Aria Operations and Aria Operations for Logs. These flaws, if left unaddressed, could lead to privilege escalation and credential theft. Details of the Vulnerabilities Below is the list of vulnerabilities found in VMware Aria Operations and Aria Operations for Logs:

Community Health Center (CHC), a major healthcare organization located in Connecticut, recently informed more than 1 million patients of a data breach that compromised both personal and health-related information. CHC, a non-profit entity, offers comprehensive medical, dental, and mental health services to in excess of 145,000 actively engaged patients.

A new phishing wave has emerged that targets Microsoft advertisers through deceptive ads on Google Search. This cyberattack aims to steal credentials from users trying to access Microsoft’s advertising services. The Attack Methodology The attackers place malicious ads on Google's platform, which appear legitimate and attract unsuspecting

Cybercriminals are increasingly utilizing legitimate HTTP client tools to perpetrate account takeover (ATO) attacks targeting Microsoft 365 environments. According to recent research, 78% of Microsoft 365 tenants have encountered at least one ATO attempt in 2024 involving a distinct HTTP client tool. This represents a 7% increase in such attacks

A new cybersecurity threat known as "Syncjacking" is emerging, targeting users of Chrome extensions to gain unauthorized control over devices. This technique exploits the synchronization feature in Chrome to hijack users' data and compromise their devices. Understanding the Syncjacking Attack Syncjacking takes advantage of Chrome's

More than 57 threat groups linked to nations like China, Iran, North Korea, and Russia have been identified as leveraging Google's AI technologies to bolster their cyber and information operations. AI in Cyberattacks These hostile entities are experimenting with Google's AI tool, Gemini, to enhance their

The New York Blood Center (NYBC), a major player in blood collection and distribution, encountered a ransomware attack that has led to the rescheduling of some donation appointments. This organization, which gathers close to 4,000 blood units daily, serves a vast population across more than a dozen states and