Security News

      Blog RSS Feed Fortra Blog

      • on January 14, 2025 by Tyler Reguly

        Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and […]

      • on January 13, 2025 by Brandon Barrett

        Enterprise networks frequently experience changes in endpoint devices, software, and files, which can introduce risk to the organization. To mitigate […]

      • on January 13, 2025 by PJ Bradley

        Organizations of all types must consider and prioritize cybersecurity in order to protect against a wide range of attacks and prevent potentially […]

      • on January 10, 2025 by Lane Thames

        Tripwire’s December 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe. First on the list is a notice […]

      • on January 9, 2025 by Graham Cluley

        What is Space Bears? Space Bear is a relatively new ransomware group that first appeared on the radar in April 2024. The gang, which is aligned to […]

      Blog RSS Feed Fortra Blog

      • on January 14, 2025 by Tyler Reguly

        Today’s VERT Alert addresses Microsoft’s January 2025 Security Updates. VERT is actively working on coverage for these vulnerabilities and […]

      • on January 13, 2025 by Brandon Barrett

        Enterprise networks frequently experience changes in endpoint devices, software, and files, which can introduce risk to the organization. To mitigate […]

      • on January 13, 2025 by PJ Bradley

        Organizations of all types must consider and prioritize cybersecurity in order to protect against a wide range of attacks and prevent potentially […]

      • on January 10, 2025 by Lane Thames

        Tripwire’s December 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft and Adobe. First on the list is a notice […]

      • on January 9, 2025 by Graham Cluley

        What is Space Bears? Space Bear is a relatively new ransomware group that first appeared on the radar in April 2024. The gang, which is aligned to […]

      Palo Alto Networks Blog Palo Alto Networks Blog

      • Securing DOT Infrastructure
        on January 17, 2025 by Lakshmi Kandadai and Kyle Lanahan

        The nature of ITS networks, IT-OT convergence, limited physical security controls, and interconnected IoT devices vulnerabilities pose challenges. The post Securing DOT Infrastructure appeared first on Palo Alto Networks Blog.

      • 5 Trends Shaping Healthcare Cybersecurity in 2025
        on January 15, 2025 by Troy Ament and Tarun Sondhi

        Palo Alto Networks shares five of the top healthcare cybersecurity trends and strategies to prepare you for transformation in 2025 and beyond. The post 5 Trends Shaping Healthcare Cybersecurity in 2025 appeared first on Palo Alto Networks Blog.

      • Protecting Web-Based Work
        on January 8, 2025 by Anupam Upadhyaya

        Web browsers have evolved for work, but security hasn’t kept up. This poses cyber risks. Protecting browsers is crucial for safe web-based work operations. The post Protecting Web-Based Work appeared first on Palo Alto Networks Blog.

      • Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today
        on January 2, 2025 by Anand Oswal

        There’s a growing threat looming over our collective privacy and security — and that’s quantum computing. The post Breaking Encryption: How To Prepare For Tomorrow’s Quantum Risk Today appeared first on Palo Alto Networks Blog.

      • Securing Remote OT Operations:
        on December 26, 2024 by Qiang Huang

        Expanded attack surfaces have made OT systems a target for cyber threats, underscoring the need for a security framework tailored to remote OT environments. The post Securing Remote OT Operations: appeared first on Palo Alto Networks Blog.

      Consumer Insights News, views and insights from the Bitdefender experts

      • Responding to a Cyberattack – What to Do When You Get Hacked: A Small Business Guide
        on January 17, 2025 by Silviu STAHIE

        All businesses should operate under the assumption that a cybersecurity incident can occur at any moment. This stance also prepares them for the immediate aftermath; knowing what to do after a cyberattack is crucial when time is of the essence.  One of the biggest problems facing cybersecurity today is the belief on the part of the individual or company that it will not happen to them. The idea of getting lost in the crowd is very appealing – it’s a key reason people are caught completely by su

      • US Law Firm Reports Data Breach Affecting 3.5 Million People
        on January 17, 2025 by Alina BÎZGĂ

        US law firm Wolf Haldenstein Adler Freeman & Herz LLP (“Wolf Haldenstein”) has disclosed a serious data breach that exposed the personal information of approximately 3.5 million individuals. According to a notice published by the legal service provider on Jan. 10, the incident occurred more than a year ago, and an investigation was reportedly completed on Dec. 3, 2024. “On December 13, 2023, Wolf Haldenstein detected suspicious activity in its network environment” the notice reads. “Upon disco

      • US Residents Targeted by Phishing Toll Fee Messages via SMS
        on January 17, 2025 by Vlad CONSTANTINESCU

        Criminals are sending US residents rogue toll fee phishing messages via SMS in a new malicious campaign. New smishing campaign targets US residents A surge in spam messages sent to US residents has authorities concerned. Threat actors found a way to weaponize toll road operators, impersonating electronic tolling programs to send specially crafted phishing messages via SMS. As usual with phishing campaigns, the messages instill a sense of urgency by threatening their recipients with hefty fin

      • Hackers Claim to Have Senators’ Emails and Phone Numbers after Ransomware Attack on Oklahoma University
        on January 17, 2025 by Filip TRUȚĂ

        The University of Oklahoma is investigating a potential breach after hackers claimed to have stolen sensitive data from the school’s IT network. The public research university, in Norman in the US state of Oklahoma, has some 34,000 students enrolled, and employs nearly 4,000 faculty members, as of the fall of 2024. The university offers hundreds of baccalaureate, master’s, doctoral, and certificate programs. On Tuesday, news broke out that the school had suffered a cyber intrusion. The perps

      • Overpayment Scams Explained: Why They Work and How to Stop Them
        on January 17, 2025 by Cristina POPOV

        Imagine receiving a large order—a big win for your small business, right? But then the payment arrives, and it’s for more than the agreed amount. The customer quickly reaches out, apologizing for the “mistake” and asking for a refund of the overpaid portion. You issue the refund, thinking it’s a simple fix, only to discover later that the original payment was fraudulent. Now, you’re out the refund money, plus any banking fees and your business’s reputation may take a hit. This is a common overp