The Matrix open network for decentralized communication has announced a record growth of 79% in the past 12 months, now counting more than 60 million users....
Researchers following the activities of advanced persistent (APT) threat groups originating from China, North Korea, Iran, and Turkey say that journalists and media organizations have remained a...
Threat analysts have uncovered a large-scale campaign targeting Elastix VoIP telephony servers with more than 500,000 malware samples over a period of three months. Elastix is a server...
A threat actor is infecting industrial control systems (ICS) to create a botnet through password “cracking” software for programmable logic controllers (PLCs). Advertised on various social media...
The Tor Project team has announced the release of Tor Browser 11.5, a major release that brings new features to help users fight censorship easier. The...
Security researchers have detected a massive campaign that scanned close to 1.6 million WordPress sites for the presence of a vulnerable plugin that allows uploading files...
For more than a year, North Korean hackers have been running a ransomware operation called HolyGhost, attacking small businesses in various countries. The group has been...
“Vulnerable instances of Log4j will remain in systems for many years to come, perhaps a decade or longer,” the Cyber Safety Review Board (CSRB) has concluded....
Companies with small security teams continue to face a number of distinctive challenges that place these organizations at greater risk than larger enterprises, according to Cynet....
In the power circles where policy and technology meet, there always seems to be someone with his or her “hair on fire” about some issue or...