Threat actors can take advantage of a weakness that affects Microsoft Defender antivirus on Windows to learn locations excluded from scanning and plant malware there. The...
UniCC, the largest carding site operating on the dark web at the moment, has announced its retirement, after reportedly generating $358 million in sales. Along with...
The Commission is still waiting for an empty chair to be filled as observers call for a vote on Biden nominee Gigi Sohn. Federal Communications Commission...
A study examining intergenerational attitudes towards cybersecurity in the workplace has concluded that collaboration between older and younger members of the IT workforce must be fostered...
A new open source service aims to speed up the security industry’s response to zero-days and high impact vulnerabilities. Bug Alert, developed by security engineer Matthew Sullivan, is...
Ukrainian police officers have arrested a ransomware affiliate group responsible for attacking at least 50 companies in the U.S. and Europe. It is estimated that the...
A new consortium aims to enable deeper collaboration on digital challenges. Fulfilling a Congressional mandate, the Defense Department recently launched a new hub to facilitate back-and-forth...
APT35 (aka Charming Kitten, TA453, or Phosphorus), suspected of being an Iranian nation-state actor, started widespread scanning and attempted to leverage Log4j flaw in publicly facing...
Phishers are creating Adobe Creative Cloud accounts and using them to send phishing emails capable of thwarting traditional checks and some advanced threat protection solutions, Avanan security researcher...
ESET researchers took an in-depth look into the abuse of vulnerable kernel drivers. Vulnerabilities in signed drivers are mostly utilized by game cheat developers to circumvent...