With cybersecurity threat vectors evolving every day and with attackers employing a more innovative and unpredictable approach through combining various types of attack, it’s no surprise...
As the markets continue to fluctuate, budget cuts and layoffs now extend across the tech industry, with cybersecurity no exception from tightening its belt and assessing its...
Two Estonian nationals were arrested in Estonia, on Sunday, after being indicted in the U.S. for running a massive cryptocurrency Ponzi scheme that led to more...
Sports betting company DraftKings said today that it would make whole customers affected by a credential stuffing attack that led to losses of up to $300,000....
Malwarebytes’ Black Friday deals are now live, with 50% off consumer products and 25% off their business antivirus solution until the end of Cyber Monday on...
An information-stealing Google Chrome browser extension named ‘VenomSoftX’ is being deployed by Windows malware to steal cryptocurrency and clipboard contents as users browse the web. This...
The Google Cloud Threat Intelligence team has open-sourced YARA Rules and a VirusTotal Collection of indicators of compromise (IOCs) to help defenders detect Cobalt Strike components...
Researchers discovered 1,550 mobile apps leaking Algolia API keys, risking the exposure of sensitive internal services and stored user information. Of those apps, 32 expose admin...
The Government Accountability Office made a new case for improving the cybersecurity safeguards within offshore drilling and natural gas facilities. Threats to the U.S.’s critical infrastructure...
The request will help the agency develop the platform to address current challenges related to cyber threat intelligence. The General Services Administration filed a request for information on...