The popular conspiracies on Weibo about the origins of COVID-19 differ substantially from those in the U.S. Conspiracy theories about COVID-19 have accompanied the pandemic from...
Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the GNU Privacy Guard (GnuPG) free encryption software, has a “severe” security vulnerability and should not be...
iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. With the release of iOS 14 last fall, Apple has added a new...
Tanium may not be a household name, at least not yet. But the fast-growing cybersecurity company, which moved its headquarters from the San Francisco Bay Area...
A prominent vehicle-for-hire and parcel delivery company based in Pakistan has suffered a significant data breach which affected its extensive user database. The Safety Detectives cybersecurity team, led...
Clearsky researchers linked the Lebanese Cedar APT group to a cyber espionage campaign that targeted companies around the world. Clearsky researchers linked the Lebanese Cedar group...
Cybersecurity startup CybSafe, a “behavioral security” platform, has raised $7.9 million in a Series A funding round led by IQ Capital with participation from Hanover Digital Investments (HDI) GmbH and B8...
Emotet, one of the most active and dangerous botnets, has been taken down by international authorities, in an operation coordinated by Europol and Eurojust. This email spamming...
As the manufacturing sector is moving towards automation and using software-centric and IoT technologies, cybercriminals see a larger attack surface to target to gain access inside...
The cybersecurity industry has embraced MITRE ATT&CK for good reason: it provides security leaders and practitioners an objective, third-party standard with which to evaluate their own...