The source code of a remote access trojan (RAT) dubbed ‘CodeRAT’ has been leaked on GitHub after malware analysts confronted the developer about attacks that used the...
Google has released Chrome 105.0.5195.102 for Windows, Mac, and Linux users to address a single high-severity security flaw, the sixth Chrome zero-day exploited in attacks patched...
The BlackCat/ALPHV ransomware gang claimed responsibility for an attack that hit the systems of Italy’s energy agency Gestore dei Servizi Energetici SpA (GSE) over the weekend. GSE is a publicly-owned...
Cybercriminals using Prynt Stealer to collect data from victims are being swindled by the malware developer, who also receives a copy of the info over Telegram messaging...
Electronics giant Samsung has confirmed a new data breach today after some of its U.S. systems were hacked to steal customer data. The company said its systems...
The head of CISA’s National Risk Management Center pointed to public-private partnerships and enhanced resource sharing activities as key to defending against outside threats to voting...
https://player.vimeo.com/video/742959358?h=2d5bd6b2f4&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 As part of digital transformation, more and more organizations are transforming their application using cloud native architecture to become more agile and accelerate time to...
A new research study focused on SaaS usage among enterprises across the USA, UK, and Europe, highlights a striking difference between consumption and security of SaaS...
A global research study from Lenovo reveals how the CIO role has evolved, shedding light on growing areas of responsibility and increasing influence in the C-Suite,...
Pen testers hunting for low-severity bugs found a far more severe cross-site request forgery (CSRF) flaw in the open source csurf software. Researchers from UK-based cybersecurity firm Fortbridge...