A platform for sharing and requesting indicators of compromise (IoCs) associated with different malware strains is the latest open source intelligence (OSINT) service launched by Abuse.ch....
The security and privacy of Apple’s Bluetooth location-tracking system has earned praise from researchers who uncovered two implementation flaws in the technology. Apple’s OF (Offline Finding)...
Bloomberg has reported that a group of hackers have breached a database containing security camera feeds collected by Verkada Inc., a Silicon Valley startup. The database includes live...
Researchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. In late 2020, Secureworks CTU researchers observed...
Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who...
Veritas Technologies revealed new research that highlights the dangers of mis-using instant messaging (IM) and business collaboration tools: 71% of office workers globally – including 68%...
The new year is upon us, and as such, it is a time to reflect on what worked over the past 12 months, and more importantly,...
The Joint Chiefs chairman says the organizations have not yet worked out how to keep the data flowing after the long-awaited split. Despite years of waiting and a last-minute...
The official domain for .gov websites shifted from the government’s landlord to the government’s central cybersecurity shop. Management of the internet domain reserved for government agencies...
The audit found the Defense Department has improved weapon systems cybersecurity in recent years, but detailed requirements must make it into contracts. Despite the Defense Department’s...