The new executive order updating the sanctions regime between U.S. citizens and China is a “national security action,” according to...
Security researchers have uncovered multiple unprotected properties to bypass Trusted Types, a widely used web security mechanism, in some scenarios. Trusted Types is an important technology that...
Data breaches have increased each year since 2015. The Government Accountability Office is recommending the Department of Health and Human Services establish a feedback mechanism to...
The Federal Bureau of Investigation (FBI) warns of increasing complaints that cybercriminals are using Americans’ stolen Personally Identifiable Information (PII) and deepfakes to apply for remote...
The Raccoon Stealer malware is back with a second major version circulating on cybercrime forums, offering hackers elevated password-stealing functionality and upgraded operational capacity. The Raccoon...
A new phishing attack is using Facebook Messenger chatbots to impersonate the company’s support team and steal credentials used to manage Facebook pages. Chatbots are programs...
Over 900,000 misconfigured Kubernetes clusters were found exposed on the Internet to potentially malicious scans, some even vulnerable to data-exposing cyberattacks. Kubernetes is a highly versatile...
The Bank of the West is warning customers that their debit card numbers and PINs have been stolen by skimmers installed on several of the bank’s ATMs....
The Vice Society ransomware gang has claimed responsibility for last week’s cyberattack against the Medical University of Innsbruck, which caused severe IT service disruption and the...
Executive performance evaluations will be increasingly linked to ability to manage cyber risk; almost one-third of nations will regulate ransomware response within the next three years;...
The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have...
Recent Comments