Though many healthcare organizations still consider it optional, two-factor authentication – also known as Multi-Factor Authentication (MFA) – is an indispensable part of a secure environment,...
Digital Shadows released research on the most popular items for sale on the dark web this holiday season – this one is shaping up to be different than any...
The coronavirus pandemic has sparked a new round of digital transformation. But in many cases, the rapid pace of digital acceleration has enlarged the digital footprint...
The bottom line is that none of the 23 agencies audited fully implemented foundational risk management practices. Days after news that sophisticated hackers exploited a flaw...
The Pentagon’s Cybersecurity Maturity Model Certification program will begin including security requirements in select solicitations starting next year. The Defense Department, worried about potential cybersecurity risks...
Since its discovery at the end of July 2020, the MountLocker ransomware has been growing rapidly, and it has now become very prominent and geographically diverse....
Recently, a new Chinese APT campaign dubbed Operation StealthyTrident has been observed by researchers from ESET and Avast. Researchers from both security firms have released separate details about this...
Recently, FireEye researchers have disclosed that a global widespread campaign has been affecting public and private organizations around the world. What was discovered The campaign has targeted government,...
Lookout, Inc. announced the discovery of Goontact, a new spyware targeting iOS and Android users in multiple Asian countries. Uncovered by the Lookout Threat Intelligence team, Goontact targets users of...
Apple has officially rolled out the new privacy labels on its App Store, which allows users to understand the type of data collected by each app....