Patching is a fact of life for IT administrators. And, although it is essential to maintain security, keeping up with vendors’ patch release cycles is a...
An ongoing malware distribution campaign targeting South Korea is disguising RATs (remote access trojans) as an adult game shared via webhards and torrents. The attackers are...
The Dutch Police have arrested nine people for targeting and stealing money from the elderly by impersonating bank employees. The group of bank help desk fraudsters,...
Two Eastern European men were sentenced to prison on Racketeer Influenced Corrupt Organization (RICO) charges for bulletproof hosting services used by multiple cybercrime operations to target...
Security researchers have discovered that a historic vulnerability affecting both MySQL and MariaDB databases caused serious flaws for security technologies from AWS. AWS Web Application Firewall (WAF) customers...
Malware authors often take advantage of vulnerabilities in popular software. But, malware is also prone to bugs and coding errors, causing it to crash and serve...
How often, when sending messages via a communication platform, are you thinking about your sensitive and private user information being exploited? Communications platforms not only enable...
The average global response to a cyberattack is 20.9 hours, according to the recently released Deep Instinct Voice of SecOps Report. Security operations professionals cite threats...
A new Report, “Ransomware in Focus,” based on a survey of more than 250 Chief Information Security Officers (CISOs), cited ransomware as the #1 threat facing...
Cyber leaders’ plan to emphasize collective defense over offense hinges on industry’s willingness to share information with government in real time. Establishing a working public-private partnership...