Install
Specialized Cyber Security Search
Expert-tuned relevance
4CyberSecurity is a focused search engine built for people who need precise, relevant results about Cyber Security. It aggregates multiple specialized indexes, expert-ranked signals, and AI-driven summaries so you can find CVE entries, vendor guidance, tools, research papers, and related services without sifting through general web noise. Part of the 4SEARCH network of topic specific search engines.
Fargo Park District says it experienced 'cybersecurity event"
3+ hour, 42+ min ago (224+ words) Our newsroom occasionally reports stories under a byline of "staff." Often, the "staff" byline is used when rewriting basic news briefs that originate from official sources, such as a city press release about a road closure, and which require little or no reporting. At times, this byline is used when a news story includes numerous authors or when the story is formed by aggregating previously reported news from various sources. If outside sources are used, it is noted within the story. FARGO " The Fargo Park District was hacked several weeks ago, according to a release issued Friday, Dec. 5. Park officials announced in a statement that the district "experienced a cybersecurity event that caused temporary disruptions to phone, email, and internal systems." The statement gave few details on the incident, other than to say it was discovered Oct. 27 and staff acted…...
Cultural Lag Leaves Security as the Weakest Link
4+ hour, 30+ min ago (577+ words) Home " Contributed Content " Cultural Lag Leaves Security as the Weakest Link For too long, security has been cast as a bottleneck " swooping in after developers build and engineers test to slow things down. The reality is blunt; if it's bolted on, you've already lost. The ones that win make security part of every decision, from the first line of code to the last boardroom conversation. That cultural shift is still missing in many enterprises. Too many security leaders operate as auditors. Too many development teams see security as someone else's problem. DevSecOps forces those worlds to collide, and that's exactly what makes it powerful. This shift is also rewriting what it means to be a Chief Information Security Officer (CISO). Once you take the role, you are an organisation leader, whether you like it or not. The job isn't just…...
6+ hour, 49+ min ago (305+ words) From record-breaking DDoS attacks to millions infected by malicious extensions, this week delivered some of the most alarming cyber incidents of the year. I'm PCMag's executive editor of reviews, steering our coverage to make sure we're testing the products you're interested in buying and telling you whether they're worth it. I've been here for more than 10 years. I previously managed the consumer electronics reviews team, and before that, I covered mobile, smart home, and wearable technology for PCMag and Gigaom." But for now, you're probably doing your holiday shopping (check out all the great deals we've found and our gift guides for everyone), and we have tons of great tips for staying safe while you shop, as well as avoiding this year's most common scams. This is the time of year the scammers ramp up their attacks. Meanwhile, this week…...
Pharma firm Inotiv discloses data breach after ransomware attack
7+ hour, 43+ min ago (527+ words) Critical React, Next.js flaw lets hackers execute code on servers North Korea lures engineers to rent identities in fake IT worker scheme CISA warns of Chinese "BrickStorm" malware attacks on VMware servers Cloudflare blames today's outage on emergency React2Shell patch Pharma firm Inotiv discloses data breach after ransomware attack InfoSec4TC lifetime cybersecurity training is now $53 in this deal American pharmaceutical firm Inotiv is notifying thousands of people that they're personal information was stolen in an'August 2025 ransomware attack. Inotiv is an Indiana-based contract research organization specializing in drug development, discovery, and safety assessment, as well as live-animal research modeling. The company has about 2,000 employees and an annual revenue exceeding $500 million. When it disclosed the incident, Inotiv said that the attack had disrupted business operations after some of its networks and systems (including databases and internal applications) were taken down. Earlier this week,…...
Real ID the Latest Step Toward a 'Total Surveillance Society,' Critics Say
7+ hour, 49+ min ago (859+ words) A Real ID QR code is displayed as people show their Real ID in a check point at Newark International Airport in Newark, New Jersey, U.S., May 7, 2025. (REUTERS/Eduardo Munoz) Kevin Stocklin is a reporter on business and politics, and an award-winning writer/producer of documentary films. His work has been published in The Epoch Times, The Federalist, The Daily Signal and The American Conservative. Previously, he worked more than a decade on Wall Street." As Americans adapt to new regulations requiring Real ID to board flights, critics assert that these documents are more than upgraded driver's licenses; they are the latest component in the creation of national biometric databases and surveillance systems. "Most people look at the card and they say, "This is just a driver's license with a star,' but that's not true," Twila Brase, president of Citizens' Council…...
The Largest Telecommunications Attack in U.S. History: What Really Happened—And How We Fight Back
8+ hour, 48+ min ago (544+ words) When Senator Ben Ray Luj'n warned that the United States was facing "the largest telecommunications hack in our nation's history," it marked a turning point in how we understand national cyber risk. On December 4, 2024, the White House confirmed a sprawling cyber-espionage campaign targeting 80 global telecom providers across dozens of countries. A joint task force'the Operation Enduring Security Framework'was launched by the NSA, Pentagon, and CISA to contain the damage. The adversary behind it: a sophisticated nation-state threat actor Microsoft calls Salt Typhoon, also tracked as Ghost Emperor, FamousSparrow, Earth Estrie, UNC2286, and earlier as LightBasin / UNC1945 / LIMINAL PANDA. And the campaign isn't over. A DHS memo released in June 2025 revealed Salt Typhoon had "extensively" breached a U.S. state's Army National Guard network, gathering administrator credentials and sensitive configuration data'with indications of broader penetration across all 50 states. This is what happened'and the blueprint for…...
ShadyPanda Takes its Time to Weaponize Legitimate Extensions
9+ hour, 41+ min ago (594+ words) Home " Cybersecurity " ShadyPanda Takes its Time to Weaponize Legitimate Extensions" ShadyPanda has been playing the long game. Over the last seven years, the group has been uploading malicious extensions on the downlow, gaining user trust and then weaponizing them." The threat actors have uploaded somewhere north of 100 malicious extensions, say Koi Security researchers, who said the extensions can track and profile Chrome and Microsoft Edge users as well as execute a payload on systems." According to Koi Security researchers, ShadyPanda has published more than 100 malicious extensions that can track and profile Chrome and Microsoft Edge users as well as execute a payload on their systems. Seems like users have fallen for their machinations " the extensions have been downloaded more than four million times, with some still available to unsuspecting users." "Malicious code poses a real challenge since it closely resembles…...
Ghost-Tap Scam Makes Payments Scarier
10+ hour, 13+ min ago (465+ words) Home " Cybersecurity " Ghost-Tap Scam Makes Payments Scarier" Do you think ghostly things just come out for Halloween? Think again. Long after the spooky holiday ended, the Better Business Bureau (BBB) has warned of a new scam " ghost-tapping " aimed at people using tap-to-pay mobile apps and even some credit and debit cards at a retailer's point of sale." The scam targets tap-to-pay cards and mobile wallets like PayPal and Venmo apps on smartphone devices that support tap-to-pay'functionality and mobile payments. Scammers take advantage of Near Field Communication (NFC) that facilitates tap-to-pay by letting devices in proximity to "speak" to each other and exchange data." By tapping payment information is sent to a payment terminal." The agency said that consumers should be vigilant, particularly if they receive bank alerts about a small or unusual test charge, a request to tap without offering…...
ISMG Editors: Inside the Rapid Evolution of Ransomware
10+ hour, 13+ min ago (44+ words) In this week's panel, four ISMG editors discussed the latest shifts in ransomware tactics, a major development in the Texas challenge to the HIPAA Privacy Rule ... Join the ISMG Community Thank you for registering with ISMG Complete your profile and stay up to date...
CrowdStrike Extends Scope of AWS Cybersecurity Alliance
11+ hour, 3+ min ago (377+ words) Home " Cybersecurity " CrowdStrike Extends Scope of AWS Cybersecurity Alliance CrowdStrike this week extended its alliance with Amazon Web Services (AWS) to automate configuration of its Falcon security information event management (SIEM) platform in addition to providing a consumption-based pricing option to organizations deploying its platforms on the AWS cloud. Announced at the re:Invent 2025 conference, CrowdStrike also announced an alliance with Accenture to deploy CrowdStrike offerings on AWS cloud services. Additionally, CrowdStrike revealed it is using Amazon EventBridge, a serverless event bus, to stream data from AWS Security Hub and Amazon GuardDuty into its platform, along with adding support for Amazon Athena to provide federated search capabilities to data stored in the Amazon Simple Storage Service (Amazon S3). Finally, CrowdStrike has gained an Amazon Web Services (AWS) Agentic AI Specialization competency for its work securing artificial intelligence (AI) agents deployed on…...