The constant deep-learning advancements, widespread microphones, and online services are actively escalating the threat of acoustic side-channel attacks on keyboards. An innovative...
A newly numbered Windows zero-day vulnerability (CVE-2022-30190) is being exploited in the wild via specially crafted Office documents (without macros), security researchers are warning. After initially...
Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its...
Millions of employees are now working from home or in a hybrid setting. Unfortunately for cybersecurity, hackers aren’t confined to office walls. It’s time for your...
Group-IB shares its analysis of the landscape of the most widespread cyber threat in the world: scams. Accounting for 57% of all financially motivated cybercrime, the scam...
Network engineers and CIOs agree that cybersecurity issues represent the biggest risk for organizations that fail to put networks at the heart of digital transformation plans. According to...
Ninety-three percent of cyber decision-makers say public-private partnerships are vital to national defense, but only 34 percent believe they are very effective, according to a study...
ANALYSIS In the absence of any progress at the federal level, US states continue to move on consumer privacy legislation to give individuals more control and security...
All computer systems on the network of Costa Rica’s public health service (known as Costa Rican Social Security Fund or CCCS) are now offline following a Hive...
Threat analysts have spotted a new version of the XLoader botnet malware that uses probability theory to hide its command and control servers, making it difficult...
Interpol has announced the arrest of three Nigerian men in Lagos, who are suspected of using remote access trojans (RATs) to reroute financial transactions and steal...
Recent Comments