Ukraine remains under constant threat as the Russian state-sponsored hacking group Shuckworm (aka Armageddon or Gamaredon) continues to carry out numerous...
It has been 20 years since sender identity fraud shifted to the world of email and became known as phishing. In the early days, email threats were largely...
For organizations experiencing data breaches, the consequences are considerable, especially for security operations. IBM reports that over 25,000 data records are stolen with the average data breach, and...
Stories about cyberattacks and security breaches are popping up more and more frequently in the news and it seems as though no company is immune to...
The information security industry is playing catch-up when it comes to positively influencing behavior – the proliferation of remote working arrangements, exacerbated by the stress associated...
Sumo Logic released findings from its fifth annual report. ”The Continuous Intelligence Report: The State of Modern Applications, DevSecOps and the Impact of COVID-19” provides an inside...
Few cybersecurity components are as familiar as the next-generation firewall (NGFW) for enterprise protection. Despite this ubiquity, it is common for security teams to operate their NGFW in...
Google has announced more changes to the way Chrome handles same-site cookie requests, the browser developers have announced. The world’s most popular web browser started blocking...
A security researcher discovered fresh flaws in open source image converter ImageMagick during the process of exploring an earlier vulnerability dating back four years. Alex Inführ...
The Sploitus exploit search engine has become subject to a DMCA copyright complaint in a case the creator believes is due to a failed piracy block...
The Biden-Harris transition team has explicitly called out cybersecurity as a priority in naming the first six individuals it plans to appoint or nominate for key cabinet...
Recent Comments