11/30/20 Update below. This post was originally published on November 28th, 2020. It has been updated to reflect Advantech’s confirmation of the attack. Industrial automation and Industrial IoT...
A rather complex phishing scheme for stealing Office 365 credentials from small and medium-sized businesses in the U.S. and Australia combines cloud services from Oracle and...
HD-PLC Alliance has started standardization work that will allow the use of enhanced network security functions, with the aim of using High-Definition Power Line Communication technology in...
Cybercriminals have been leveraging lookalike domains in cyberattacks such as Business Email Compromise (BEC), phishing, and online fraud campaigns. Recently, Bolster has evaluated the use of fraudulent...
High demand for cybersecurity software accelerates company’s product development and market expansion DefenseStorm, the leading cloud-based cybersecurity and cybercompliance management provider to regional and community banks...
Tanium and CIS work in collaboration to educate and empower agencies with the right tools to solve their most challenging cybersecurity initiatives Tanium, the provider of...
Abnormal Security says it has tripled its annual recurring revenue and Fortune 500 customer base since the start of 2020 as the shift to remote work...
Threat actors already stole nearly 4,000 credentials before the holiday was even over, according to report. Millions of family and friends, forced to spend Thanksgiving socially...
Everyone should be on the lookout for a massive ongoing phishing attack today, pretending to be an invite for a Zoom meeting. Hosted on numerous landing...
Driven by the profits to be achieved via ransomware, most botnet operators have dropped banking Trojans in favor of supporting and running crypto-locking malware attacks, according...