A key lawmaker on the House Homeland Security Committee wants more details on what was breached and what was lost when the SolarWinds Orion platform was...
As the agency finalizes guidance for approving the sale of devices such as those used to monitor and control glucose levels, the comments highlight competition and...
Unidentified cyber threat actors have started using Brute Ratel C4 (BRc4), an adversary simulation tool similar to Cobalt Strike, to try to avoid detection by endpoint security solutions...
https://player.vimeo.com/video/725950750?h=d413b55e28&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Whether it’s through stolen credentials, phishing attacks, or simply user errors, people continue to pose the greatest risk to cybersecurity. While behavioral attacks are nothing...
Officials are connecting the “Maui” ransomware to attacks on the public health sector over the past year. State-sponsored actors from North Korea are behind a lesser-known...
Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency (CISA), has warned the UK government that they could be the victim of a...
Microsoft says that a recently spotted Windows worm has been found on the networks of hundreds of organizations from various industry sectors. The malware, dubbed Raspberry...
https://player.vimeo.com/video/724851593?h=45f7d6f572&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this video for Help Net Security, Scott Sutherland, Senior Director, Adversary Simulation and Infrastructure Testing, NetSPI, discusses how, in order to stay ahead of malicious...
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the...
A recent attack on a rare-earths processor shows a new facet of information warfare: weaponized NIMBYism. A Chinese disinformation effort against a Pentagon contractor building a...