Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege —...
If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far...
The Digital Operational Resilience Act would force non-EU companies with a significant presence in member states to create subsidiaries that can be regulated under their jurisdiction....
When it comes to federal cybersecurity policy, the executive branch is far ahead of Congress. The White House’s cyber executive order and subsequent policies like the...
The Cyber-Informed Engineering Strategy is organized across five pillars. The Department of Energy this week released its national Cyber-Informed Engineering Strategy that provides guidance for building resilient energy...
US law enforcement has announced the dismantling of infrastructure used by a Russian botnet responsible for the compromise of millions of computers and internet-connected devices worldwide....
MetaMask and Phantom are warning of a new ‘Demonic’ vulnerability that could expose a crypto wallet’s secret recovery phrase, allowing attackers to steal NFTs and cryptocurrency stored...
Ever since 2004, the payment card industry has required merchants who accept credit card payments to adhere to the Payment Card Industry Data Security Standards (PCI...
Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use...
A threat actor known as ‘Blue Mockingbird’ targets Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources. The...