Category: EN

CPAP Medical Data Breach Impacts 90,000 People

CPAP Medical Supplies and Services has disclosed a data breach resulting from an intrusion that occurred in December 2024. The post CPAP Medical Data Breach Impacts 90,000 People appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Exploring Passwordless Authentication

Explore passwordless authentication methods, implementation strategies, security considerations, and future trends. Learn how to enhance security and improve user experience by eliminating passwords. The post Exploring Passwordless Authentication appeared first on Security Boulevard. This article has been indexed from Security…

Top 10 Frequently Asked Questions on ISO 27018 Compliance

As cloud adoption continues to rise, organizations are increasingly concerned about safeguarding personal data stored and processed by cloud service providers (CSPs). ISO/IEC 27018 is an internationally recognized standard that specifically addresses data protection in cloud environments. It provides guidelines…

Interpol operation seizes $97 million in African cybercrime sweep

Authorities in Africa have arrested 1,209 people in an Interpol-led crackdown on cybercrime that targeted nearly 88,000 victims. 11,432 malicious infrastructures were dismantled during Operation Serengeti 2025 (Source: Interpol) Operation Serengeti 2.0 The operation, which ran from June to August…

Colt Confirms Ransomware Attack Resulted in Customer Data Theft

Industrial technology company Colt has confirmed that a recent ransomware attack on its business support systems resulted in the theft of customer data, marking the latest in a series of high-profile cybersecurity incidents affecting critical infrastructure providers. The company disclosed…

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise

A critical security vulnerability in Microsoft Azure’s API Connection architecture has been discovered that could allow attackers to completely compromise resources across different tenant environments, potentially exposing sensitive data stored in Key Vaults, Azure SQL databases, and third-party services like…

MITRE Updates List of Most Common Hardware Weaknesses

MITRE has updated the list of Most Important Hardware Weaknesses to align it with evolving hardware security challenges. The post MITRE Updates List of Most Common Hardware Weaknesses appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…

Hundreds Targeted in New Atomic macOS Stealer Campaign

Between June and August, over 300 entities were targeted with the Atomic macOS Stealer via malvertising. The post Hundreds Targeted in New Atomic macOS Stealer Campaign appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…

Microsoft to Make All Products Quantum Safe by 2033

Microsoft has set out a roadmap to complete transition to PQC in all its products and services by 2033, with roll out beginning by 2029 This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft to Make All…