Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide...
While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust...
Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million...
Attackers are abusing the Certificate Transparency (CT) system to compromise new WordPress sites in the typically brief window of time before the content management system (CMS) has been...
A report from the UK government has laid bare the risks of malicious mobile apps, as lawmakers call for tougher protections for consumers. The report (PDF), published by...
A recently disclosed cyber-attack against Heroku that involved GitHub may be far more severe than first suspected. Heroku, the Salesforce-owned cloud application platform, began the forced...
Organizations in India face a six-hour data breach reporting deadline, following the introduction of new rules by the country’s computer emergency response team, CERT-In. The new rules will...
For about half a year, work email accounts belonging to over 100 employees of the National Health System (NHS) in the U.K. were used in several...
Phishing emails increasingly target verified Twitter accounts with emails designed to steal their account credentials, as shown by numerous ongoing campaigns conducted by threat actors. Verified...
Salesforce-owned Heroku is performing a forced password reset on a subset of user accounts in response to last month’s security incident while providing no information as...