(ISC)² published a new research study highlighting the unique challenges diverse cybersecurity professionals worldwide face and provides recommendations to create positive change. “In Their Own Words: Women...
The year is 2007, the iPhone 1 has just been released, and many of us are still bound to desktop computers on office desks. Over the...
Given current headlines, one might think that every organization must be in a continual state of cyberwarfare. Everywhere we look, we are under siege. On one...
The NSA published an advisory regarding the use of wildcard TLS certificates, which can be escalated to carry out the Application Layer Protocol Content Confusion Attack...
Cyble Research Labs discovered an Android-based phishing campaign targeting customers of telecommunication services based in Japan. What happened? According to the research, attackers created multiple domains to...
The REvil ransomware operation has likely shut down once again after an unknown person hijacked their Tor payment portal and data leak blog. The Tor sites...
For the first half of 2021, almost $600 million was linked to ransomware payments thanks to reports filed by financial services firms. More than $5 billion...
The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding its distribution channels, ultimately leading to...
Researchers find that lax ICS security is putting critical services at risk of exploitation. The “abysmal” state of security for industrial control systems (ICSs) is putting...
Researchers have disclosed the details of new timing and power-based side-channel attacks that affect all CPUs made by AMD, but the chipmaker says no new mitigations...