cyberattack
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Largest Croatian hospital under cyberattack
The University Hospital Centre Zagreb (KBC Zagreb) is under cyberattack that started on Wednesday night, the Croatian Radiotelevision has reported. Because of the attack, the …
![Crown](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20150213/crown-1500-400x200.webp)
Crown Equipment cyberattack confirmed, manufacturing disrupted for weeks
Ohio-based Crown Equipment, which is among the largest industrial and forklift truck manufacturers in the world, has become a victim of a cyberattack “by an …
![CDK](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/20115352/cdk-1500-400x200.webp)
CDK Global cyberattack cripples 15,000 US auto dealerships
CDK Global, a software-as-a-service (SaaS) provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its …
![Omni Hotels](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/04161619/omni_hotels-1500-400x200.webp)
Omni Hotels suffer prolonged IT outage due to cyberattack
Texas-based Omni Hotels & Resorts has been responding to a cyberattack that started last Friday, which resulted in the unavailability of many of its IT systems. According …
![Fujitsu](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/18185740/fujitsu-1500-400x200.webp)
Fujitsu finds malware on company systems, investigates possible data breach
Fujitsu Limited, the largest Japanese IT services provider, has announced that several of the company’s computers have been compromised with malware, leading to a …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/07095552/ai-artificial_intelligence-1500-400x200.webp)
Immediate AI risks and tomorrow’s dangers
“At the most basic level, AI has given malicious attackers superpowers,” Mackenzie Jackson, developer and security advocate at GitGuardian, told the audience last …
![ALPHV Blackcat](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/19164856/alphv-blackcat-1400-400x200.jpg)
ALPHV/BlackCat threatens to leak data stolen in Change Healthcare cyberattack
The ALPHV/BlackCat ransomware group has claimed responsibility for the cyberattack that targeted Optum, a subsidiary of UnitedHealth Group (UHG), causing disruption to its …
![Varta](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15123815/varta-1400-400x200.jpg)
Battery maker Varta halts production after cyberattack
German battery manufacturer Varta was forced to shut down its IT systems and stop production as a result of a cyberattack. The Varta cyberattack The cyberattack occurred on …
![Tietoevry](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/22120745/tietoevry-1400-400x200.jpg)
Tietoevry ransomware attack halts Swedish organizations
Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The …
![Engineering-grade OT security](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/04170114/engineering-grade_ot_security-1400-400x200.jpg)
Review: Engineering-grade OT security: A manager’s guide
Andrew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Breaking down the state of authentication
In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey …
![xfinity](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/20111654/xfinity-1400-400x200.jpg)
Citrix Bleed leveraged to steal data of 35+ million Comcast Xfinity customers
Telecommunications company Comcast has confirmed a breach that exposed personal information of more than 35.8 million of Xfinity customers. Exploiting Citrix Bleed to breach …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders