Sports betting company DraftKings revealed last week that more than 67,000 customers had their personal information exposed following a credential attack in November. In credential stuffing attacks, automated...
Apple has fixed a vulnerability attackers could leverage to deploy malware on vulnerable macOS devices via untrusted applications capable of bypassing Gatekeeper application execution restrictions. Found...
The Play ransomware gang has claimed responsibility for a cyber attack on H-Hotels (h-hotels.com) that has resulted in communication outages for the company. H-Hotels is a...
The Raspberry Robin malware is now trying its hand at some trickery by dropping a fake payload to confuse researchers and evade detection when it detects...
The annual solicitation from the Small Business Innovation Research program seeks proposals for addressing seven different technology issues facing the Department of Homeland Security. The Department...
John Jackson has been working in cybersecurity for less than five years, but already has several significant wins under his belt. After five years as an engineer...
A vulnerability in how Akamai retrieves Amazon Web Services (AWS) S3 resources could allow attackers to stage web cache poisoning attacks against websites. Web cache poisoning involves malicious clients...
Netwrix has released key cybersecurity trends that will affect organizations of all sizes in 2023. Here are five specific trends that you need to be aware...
Malware continues to pose the greatest threat to individuals and businesses across nine key industries, with manufacturing, education and healthcare being the most commonly targeted, according to...
In this Help Net Security video, Ronnie Tokazowski, Principal Threat Advisor at Cofense, offers insight into the world’s most lucrative cybercrime – business email compromise (BEC). The Cofense...