A Chief Information Security Officer (CISO) plays a crucial role in protecting an organization’s digital assets. They are responsible for...
While knowing full well that human lives may be at stake, criminal gangs have been increasingly targeting the healthcare sector with high-impact attacks like ransomware. 1. Tighten up...
The term “deepfake” is used for photo, video or audio content that has been manipulated to make it seem that the subject is doing or saying...
A car theft ring that used fraudulent software to “hack” and steal vehicles with remote keyless entry and ignition systems has been dismantled by the French...
Researchers at Symantec have uncovered cyberattacks attributed to the China-linked espionage actor APT41 (a.k.a. Winnti) that breached government agencies in Hong Kong and remained undetected for...
A hacking group named ‘DiceyF’ has been observed deploying a malicious attack framework against online casinos based in Southeast Asia since at least November 2021. According...
Verizon warned prepaid customers that attackers gained access to an undisclosed number of Verizon accounts and used exposed credit card info in SIM swapping attacks. “We...
Mac users can now try the privacy features in the DuckDuckGo browser as the app has entered the beta stage of development. The app comes with...
Microsoft has long recommended that customers enable multifactor authentication (MFA) as a way of better protecting Active Directory and Azure AD accounts. Without MFA, anyone with...
The federal workers union wrote to senators opposing an amendment to the NDAA that would establish a civilian reserve at CISA. The American Federation of Government...
Researchers warn that there has been a 633% year-over-year increase in cyber-attacks launched against open source software repositories. Open source components, frameworks, libraries, and whole platforms are relied...
Recent Comments