WhatsApp malware dubbed WhatsApp Pink has now been updated with advanced capabilities that let this counterfeit Android app automatically respond to your Signal, Telegram, Viber, and...
Facebook’s long-term strategy is to desensitize users about leaked data dumps that were collected through scraping the public portion of the social network. The plan was...
JupiterOne, provider of cyber asset management and governance solutions, announced the hiring of Sounil Yu as Chief Information Security Officer, and the appointment of Latha Maripuri...
Mandiant is currently tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices. These families are related to the circumvention of authentication and backdoor access...
MI5 has warned about spies luring people on LinkedIn. According to MI5, at least 10,000 U.K. nationals have been approached by fake profiles linked to hostile...
Employee personal data has long been recognized as a vulnerable threat vector for modern enterprise cybersecurity. However, even though more employees than ever avail themselves of identity theft and credit...
Multiple members of the Accreditation Body’s board of directors also serve as consultants in the cybersecurity space, which critics say gives them an unfair advantage to...
The telecommunications industry is facing an increased threat of distributed denial-of-service (DDoS) attacks, according to a new report. Cloudflare’s new research, released earlier this week, details DDoS attacks...
Hiscox reveals that U.S. businesses’ cybersecurity spending is on the rise and they are leaders in cyber expertise, but still have more work to do when...
Pulse Secure has shared mitigation measures for a zero-day authentication bypass vulnerability in the Pulse Connect Secure (PCS) SSL VPN appliance actively exploited in attacks against...