Cybersecurity analysts at Jamf Threat Labs have recently uncovered a macOS malware family. The new malware family has been tracked as “RustBucket,” which downloads and executes...
The agency continues its post-quantum cryptography push as it looks to create guidance for all sectors. The latest step in post-quantum cryptography guidance is helping organizations...
Deputy Attorney General Lisa Monaco noted that success will be seen with a “bias towards action,” rather than just courtroom victories. Federal law enforcement’s new approach...
The Unit42 research team at Palo Alto Networks has recently discovered Trigona ransomware that attacks Windows with uncommon techniques and uses the Mimikatz exploitation tool for...
Biometric authentication has applications ranging from mobile phone access to airport security. The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure)....
Japanese Cybersecurity experts have found that ChatGPT could write code for malware by entering a prompt that makes the AI believe it is in developer mode. ...
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers reported that Cyber attackers are actively using Google...
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical infrastructure organizations in the United States...
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an outage on NCR, causing massive headaches...
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. Bumblebee is...