Those of us on the cyber threat frontlines at Keyavi Data view the entire FireEye-SolarWinds catastrophe through a very different lens. It’s a mile-high view that...
Threat actors are targeting mission-critical SAP applications unsecured against already patched vulnerabilities, exposing the networks of commercial and government organizations to attacks. Over 400,000 orgs worldwide...
A malicious document builder named EtterSilent is gaining more attention on underground forums, security researchers note. As its popularity increased, the developer kept improving it to...
After a shared Google Drive was posted online containing the private videos and images from hundreds of OnlyFans accounts, a researcher has created a tool allowing content...
A Defense Department Inspector General report surveyed more than 56,000 employees about telework during the pandemic. The Defense Department began pivoting to telework in March 2020,...
A malware attack against vehicle inspection services provider Applus Technologies paralyzed preventing vehicle inspections in eight US states. Applus Technologies is a worldwide leader in the...
Browser lockers (aka browlocks) are a class of online threats that prevent the victim from using the browser and demand a ransom. A locker is a...
Justin Grudzien says that he sees burnout among his peers in the industry and a lot of it has to do with the pressure that security...
Kroll, provider of services and digital products related to governance, risk and transparency, has announced that the firm has promoted 18 colleagues to the managing director level in the...
Halvor Molland was asleep on a brisk night in Oslo, Norway’s capital, two years ago when his phone rang around 3 a.m. The computer servers of...