Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their computing power. Cloud computing abuse leads to...
The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about...
VA Chief Information Officer Kurt DelBene told Nextgov/FCW that the department “faces a unique challenge” in adopting zero trust because of the need to secure veterans’...
White House officials named former National Security Agency official Harry Coker, Jr. as the nominee to replace former National Cyber Director Chris Inglis amid the ongoing...
The analysis of nearly 20 million information-stealing malware logs sold on the dark web and Telegram channels revealed that they had achieved significant infiltration into business...
The Norwegian National Security Authority (NSM) has confirmed that attackers used a zero-day vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) solution to breach a software platform...
In the US, California has traditionally dominated the privacy conversation. This is changing. Now organizations doing business in Virginia, Colorado, Utah, and Connecticut all have new...
VMware has patched an information disclosure vulnerability in VMware Tanzu Application Service for VMs (TAS for VMs) and Isolation Segment caused by credentials being logged and...
New details have emerged about Decoy Dog, a largely undetected sophisticated toolkit likely used for at least a year in cyber intelligence operations, relying on the...
A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It’s an open-source rootkit that has the ability to hide itself, other malicious codes, files, directories,...