Skip to content

Secure Your Digital Life

  • Home
  • Data Protection

Category: Data Protection

  • Home
  • Data Protection
  • Page 58
Data Protection

Blue Shield of California Data Breach Affects 4.7 Million Members

A misconfigured tracking tool on Blue Shield of California’s websites exposed the protected health information (PHI) of 4.7 million members to Google Ads over a

Read More
Data Protection

Microsoft now pays up to $30,000 for some AI vulnerabilities

Microsoft announced an increase in bug bounty payouts to $30,000 for AI vulnerabilities found in Dynamics 365 and Power Platform services and products. Power Platform

Read More
Data Protection

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group as

Read More
Data Protection

Yale New Haven Health data breach affects 5.5 million patients

Yale New Haven Health (YNHHS) is warning that threat actors stole the personal data of 5.5 million patients in a cyberattack earlier this month. YNHHS

Read More
Data Protection

Ransomware attacks are rising — but quiet payouts could mean there’s more than actually reported

Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents

Read More
Data Protection

Highest-Risk Security Flaw Found in Commvault Backup Solutions

A new critical vulnerability has been found in Commvault, illustrating that backup and replication solutions are highly sought after by cyber threat actors due to

Read More
Data Protection

Microsoft fixes bug causing incorrect 0x80070643 WinRE errors

Microsoft says it resolved a known issue causing erroneous 0x80070643 installation failure errors when deploying the April 2025 Windows Recovery Environment (WinRE) updates. When it

Read More
Data Protection

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called

Read More
Data Protection

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter

Read More
Data Protection

Trotz Back-Up: 86 Prozent der Unternehmen zahlen Lösegeld

Der weltweite Durchschnitt für Lösegeldzahlungen liegt bei 479.000 Dollar, in Indien bei 4,8 Millionen Dollar. Dies zeigt, dass die Angreifer ihre Forderungen je nach Region

Read More

Posts pagination

Previous 1 … 57 58 59 … 201 Next
  • Fake AI video generators drop new Noodlophile infostealer malware
  • Microsoft Teams will soon block screen capture during meetings
  • What Is CaaS (Containers-as-a-Service)?
  • Where To Watch Why Women Kill for Free (Seasons 1 & 2) in 2025
  • Your Android phone is getting a new security secret weapon – and it’s a big deal
All Rights Reserved 2026.
Proudly powered by WordPress | Theme: Fairy by Candid Themes.