The filing comes one week after the Clop cybercriminal organization claimed it stole information from Logitech through a zero-day vulnerability in Oracle’s E-Business Suite tool.
White-hat hacker and pentester Kamel Ghali talks with the Click Here podcast team about how cars became computers on wheels — and why, in the race for smarter tech, safety is still trying to catch up.
Information including names, email addresses, telephone numbers, and home and business addresses is stored on the database, in addition to donation information.
The U.S. and European law enforcement released new information to help organizations defend themselves against the Akira ransomware gang, which has attacked small- and medium-sized businesses for years.
Joining nations such as Russia, Georgia and Hungary, legislators in Kazakhstan voted to censor what they label as “LGBT propaganda” in the media and online.
The operation used a sophisticated phishing kit designed to impersonate the login and payment pages of Aruba S.p.A., stealing customer credentials and credit card details.
The cyberthreat information sharing law known as CISA 2015 and a cybersecurity grant program for state and local governments have been renewed as part of legislation to reopen the government.
The Rhadamanthys infostealer, the VenomRAT remote access trojan and the Elysium botnet were targeted in the latest phase of the international police action known as Operation Endgame.
The U.S. is establishing a "strike force" to counter cyber scam compounds across Southeast Asia that have stolen billions from Americans over the last five years.
Federal civilian agencies are not patching vulnerable Cisco devices sufficiently to protect themselves from an active hacking campaign, the Cybersecurity and Infrastructure Security Agency warned.
Concerns about domestic SIM card use in Ukrainian drones have led the Kremlin to impose a mobile internet "cooling-off period" for anyone returning home to Russia from abroad.
After years of delays, the British government introduced its landmark Cyber Security and Resilience Bill to Parliament, threatening large fines for companies that fail to protect themselves from cyberattacks.
The hackers notably used custom malware and were exploiting CVE-2025-5777 — now known colloquially as “Citrix Bleed Two” — before it was disclosed publicly in July.
Lt. Gen. Joshua Rudd, the No. 2 at U.S. Indo-Pacific Command, has emerged as a potential pick to lead U.S. Cyber Command and the National Security Agency, multiple people familiar with the search told Recorded Future News.
Court documents show evidence proving Volkov served as an initial access broker for the ransomware gang — breaking into the network of victims and then offering his access for a percentage of the ransom.
California’s legislature also has enacted an algorithmic pricing law, but it has not yet taken effect, making New York the first state in the country to regulate the practice.
California's influential privacy agency sent the state legislature three proposals, including a measure to create anti-retaliation safeguards and financial rewards for insiders who make regulators aware of corporate practices that violate state privacy law.
Checked
6 hours 6 minutes ago
The Record by Recorded Future News gives exclusive, behind-the-scenes access to leaders, policymakers, researchers, and the shadows of the cyber underground.