92% of executives reported challenges in acquiring new tech solutions, highlighting the complexities that go into the decision-making process, according to GlobalDots. Moreover, some 34% of...
We’re coming to that time of the year when employees are excited about the holidays and taking time off to be with their loved ones. But...
A compromised Ukrainian Ministry of Defense email account was found sending phishing emails and instant messages to users of the ‘DELTA’ situational awareness program to infect...
The Play ransomware gang has claimed responsibility for a cyber attack on H-Hotels (h-hotels.com) that has resulted in communication outages for the company. H-Hotels is a...
The Raspberry Robin malware is now trying its hand at some trickery by dropping a fake payload to confuse researchers and evade detection when it detects...
The annual solicitation from the Small Business Innovation Research program seeks proposals for addressing seven different technology issues facing the Department of Homeland Security. The Department...
The national cyber director also indicated plans to rely on feedback from members of the software industry who are working on recommendations for “streamlining” sector-specific regulations....
John Jackson has been working in cybersecurity for less than five years, but already has several significant wins under his belt. After five years as an engineer...
A vulnerability in how Akamai retrieves Amazon Web Services (AWS) S3 resources could allow attackers to stage web cache poisoning attacks against websites. Web cache poisoning involves malicious clients...
Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that you need to be aware...