A ransomware attack on an educational institution causes more than just class disruption. It can result in lost teaching hours,...
Statistics collected by cyber-intelligence firm KELA during this year’s second quarter show that marketplaces selling initial access to corporate networks have taken a blow. More specifically,...
Developers are furious at GitHub’s upcoming privacy policy changes that would allow GitHub to place tracking cookies on some of its subdomains. The Microsoft subsidiary announced this month, it would...
Several new marketplaces have appeared on the dark web, claiming to be the dedicated online portals for notorious criminal cartels from Mexico. Those markets offer drugs...
7-Eleven Denmark has confirmed that a ransomware attack was behind the closure of 175 stores in the country on Monday. The company did not provide any...
An automotive supplier had its systems breached and files encrypted by three different ransomware gangs over two weeks in May, two of the attacks happening within...
At least three groups split from the Conti ransomware operation have adopted BazarCall phishing tactics as the primary method to gain initial access to a victim’s...
A new class of HTTP request smuggling attack allowed a security researcher to compromise multiple popular websites including Amazon and Akamai, break TLS, and exploit Apache servers. Speaking...
Black Hat USA attendees were given a firsthand look at the new and improved ReNgine, which includes several new features for penetration testers and red teamers. ReNgine is...
The guide for state and local election officials offers free tools to help mitigate digital threats and safeguard voting systems from outside intrusion. The Cybersecurity and...
The Department of Veterans Affairs Inspector General’s office said the agency is “leaving its systems vulnerable to compromise by impostors who may gain access to protected...
Recent Comments