Users of popular Java logging library Apache Log4j have been urged to apply a second patch related to the critical ‘Log4Shell’ vulnerability after the initial fix...
2021 heralded a year of record cyberattacks, with the Identity Theft Resource Center (ITRC) reporting that the number of data breaches publicly reported so far this year has...
A ransomware attack is a destructive and costly cybersecurity incident. Your company can improve its preparedness and response by conducting tabletop exercises, which test whether your...
Breaches are on the rise, and so are their costs! The network is the highway upon which all your IT infrastructure rides. Attacks traverse these paths — too...
Threat actors are gearing up for the holidays with credit card skimming attacks remaining undetected for months as payment information is stolen from customers. Magecart skimming...
Researchers have spotted a new espionage hacking campaign targeting telecommunication and IT service providers in the Middle East and Asia. The campaign has been conducted over...
Devo Technology announced the results of its 3rd annual SOC Performance Report (SPR), a survey on the current state of security operations center (SOC) performance, conducted by...
Officials stressed the importance of maintaining a bill of materials for software in flagging the “Log4j” vulnerability. The Cybersecurity and Infrastructure Security Agency has added a...
The Python Package Index (PyPI) has removed malware-deploying and data-stealing packages that were collectively downloaded thousands of times. The trio of malicious packages duped unsuspecting users...
A fixed bug in Chrome allowed attackers to read and write local files and install malicious scripts on devices running the browser’s headless interface, researchers at...