Ads
related to: software, malicious software
Search results
Cyberattack Disrupts Auto Dealerships Across US
PC Magazine· 2 hours agoAn ongoing cyberattack at a company called CDK Global has had the ripple effect of disrupting IT operations at potentially thousands of auto dealerships...
Dozens of metro Detroit car dealers impacted by cyberattack on software company
WXYZ-TV Detroit· 15 hours agoA cyberattack on a little-known company to most Americans is having a huge impact on car dealerships...
PQShield secures $37M more for ‘quantum resistant’ cryptography | TechCrunch
TechCrunch· 12 hours agoMalicious hacking is getting increasingly sophisticated, and that’s leading to a very clear trend in...
'Vortax' Meeting App Builds Elaborate Branding, Spreads Infostealers
Dark Reading· 3 hours agoA widespread campaign aimed at stealing cryptocurrency is spreading a wave of infostealers through...
Car Dealership Data Provider Suffers Cyber Incident, Actively Investigates - Brookfield Bus Partners...
Benzinga· 22 hours agoA cyber incident at automotive data provider CDK Global, whose software is utilized by auto dealers,...
AI-boosted cyberattacks pose threat to small businesses
Digital Journal· 2 days agoThese attacks are designed to deceive employees into revealing sensitive information or downloading ...
Council Post: Why Your Business Needs To Level Up Its Defense Life Cycle Management
Forbes· 14 hours agoNew cyber threats emerge every day as malicious actors refine and escalate their attacks. Although...
Phoenix SecureCore UEFI firmware bug affects Intel processors | TechTarget
SearchSecurity.com· 5 hours agoAccording to Eclypsium, which first discovered the flaw, CVE-2024-0762 was assigned a 7.5 CVSS score and "involves an unsafe variable in the Trusted Platform Module (TPM) configuration that ...
CHERI Alliance Aims to Secure Hardware Memory
Dark Reading· 6 hours agoA new chip security consortium called CHERI Alliance is focused on protecting data stored in hardware memory from cyberattackers. The alliance backs a...
UNC3886 hackers use Linux rootkits to hide on VMware ESXi VMs
BleepingComputer· 1 hour agoA suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits...
Ads
related to: software, malicious software