Security researchers piecing together evidence from multiple attacks on cryptocurrency exchanges, attributed to a threat actor they named CryptoCore have established a strong connection to the...
The developers of Zeppelin ransomware have resumed their activity after a period of relative silence that started last Fall and started to advertise new versions of the...
Palo Alto Cortex Xpanse research team spent the first three months of 2021 monitoring the activities of attackers to better understand how much of an edge adversaries...
In the aftermath of the Colonial Pipeline attack, global IT association and learning community ISACA polled more than 1,200 members in the United States and found...
The vaccine rollout is ushering in a return to the office as many businesses adopt hybrid working models and embrace flexible workspaces. For some employers, COVID-19 has permanently...
Distributed denial of service (DDOS) attacks – when an attacker attempts to make it impossible for a service to be deliverable – are increasing in size,...
The agency’s Digital Forensics Unit wants to “tame the cybersecurity research into measured, repeatable, consistent digital forensics processes.” As more people across the globe get into...
The most popular open source repositories are rife with misconfigurations that leave countless downstream applications at risk from dependency confusion attacks, security researchers have discovered. Of the 1,000 organizations whose...
A new adversarial attack developed by scientists at the University of Maryland, College Park, can force machine learning systems to slow to a crawl, taxing servers and possibly...
Last week’s cyber attack crippled one of the largest pipelines in US, Colonial Pipeline. This was a case of ransomware attack, where hackers usually threaten to...