Out of over a thousand top-level domain choices, cyber-criminals and threat actors prefer a small set of 25, which accounts for 90% of all malicious sites....
Microsoft has seen a surge in malware campaigns using HTML smuggling to distribute banking malware and remote access trojans (RAT). While HTML smuggling is not a...
Costco Wholesale Corporation has warned customers in notification letters sent this month that their payment card information might have been stolen while recently shopping at one...
The maintainers of GoCD, a widely used, open source tool that automates the continuous delivery (CD) of software, have addressed three vulnerabilities that, if chained, could lead to...
Security researchers have discovered a high-impact vulnerability on some versions of the widely used Palo Alto GlobalProtect Firewall/VPN that leaves enterprise networks open to attack. The vulnerability (CVE 2021-3064; with...
The Pentagon will formally launch a new office dedicated to expediting the adoption of a new zero trust cybersecurity model. The Department of Defense’s (DoD) chief...
The Department of Homeland Security (DHS) has requested public input on the topic of artificial intelligence (AI), including facial recognition. In a notice recently published in...
2022 is just around the corner, and we are already following new developments in cybersecurity that will significantly impact your business in this upcoming year and...
Security researchers have a crucial role to play in balancing an offense-heavy ecosystem, the director said. Cybersecurity and Infrastructure Security Agency Director Jen Easterly will use...
Developers must use safer tools, a recent report concluded. After the SolarWinds and Kaseya attacks spread malware far and wide across government and business networks, Palo...