Hackers Observed Patching Leveraged Linux Exploit Jordyn Alger August 27, 2025 An Apache ActiveMQ flaw is being actively exploited. Then, it’s being patched by the actors who leveraged it. Read More
Report Reveals Gap Between AI Use and AI Security In Embedded Software Security Staff August 26, 2025 A new report reveals a disconnect between the organizational use of AI and AI security. Read More
CISA Issues Software Bill of Materials Draft, Encourages Public Comments Security Staff August 25, 2025 CISA published a Minimum Elements for a Software Bill of Materials (SBOM) draft and has encouraged the public to offer comments. Read More
91% of Teens Use Generative AI Security Staff August 25, 2025 A recent survey found that when presented with an online safety issue, most teen respondents will ask for help from a parent or other trusted adult. Read More
Agentic AI Browsers Exploited by “PromptFix” Trick Technique Jordyn Alger August 25, 2025 Agentic AI, while performing routine tasks such as shopping online, could be tricked into carrying out certain actions. Read More
Russia-Sponsored Cyberattack Campaign Targets Networking Devices, Critical Infrastructure Jordyn Alger August 22, 2025 A Russia-sponsored campaign is targeting end-of-life devices via a seven-year-old vulnerability. Read More
Pharmaceutical Firm Hit With Ransomware Attack Jordyn Alger August 22, 2025 Inotiv, a pharmaceutical firm, was hit with a ransomware attack.Read More
Cybercriminals Attack VPS to Access Business Email Systems Jordyn Alger August 21, 2025 An attack campaign is exploiting Virtual Private Server (VPS) infrastructure.Read More
29 Years of HIPAA: What’s Next for Healthcare Data Privacy? Jordyn Alger August 21, 2025 To commemorate the 29th anniversary of HIPAA, experts share their perspectives on modern privacy threats and how healthcare organizations can bolster security. Read More
Data Privacy Increasingly Embedded in Consumer Decisions, Research Finds Security Staff August 21, 2025 Research reveals a shift in consumer behavior in regard to data privacy. Read More