The Industrial control systems (ICS) security teams are actively fighting against a worm that is breaching and compromising the defense mechanisms of...
The legislation would improve information sharing between federal cybersecurity authorities and state and local governments. Having cleared the Senate in January, the State and Local Government Cybersecurity Act passed the...
Witnesses from CIST, NIST, and the GSA spoke before a House Homeland subcommittee on their current efforts to bolster the nation’s cyber defenses. Lawmakers explored courses...
The Spanish police have announced the arrest of 13 people and the launch of investigations on another seven for their participation in a phishing ring that...
WordPress security analysts have discovered a set of vulnerabilities impacting the Jupiter Theme and JupiterX Core plugins for WordPress, one of which is a critical privilege...
After suffering a ransomware attack by the Hive operation, the Bank of Zambia made it clear that they were not going to pay by posting a...
The US government has recovered over $15 million from Swiss bank accounts belonging to operators behind the ‘3ve’ online advertising fraud scheme. Switzerland transferred $15,111,453.84 to...
A previously unknown Chinese hacking group known as ‘Space Pirates’ targets enterprises in the Russian aerospace industry with phishing emails to install novel malware on their...
Threat actors are luring potential thieves by spamming login credentials for other people account’s on fake crypto trading sites, illustrating once again, that there is no...
Companies and other organizations should be careful when employing IT freelancers, lest they end up hiring North Korean hackers. The advice comes from the U.S. Department...
I’m a pentester – that is, a professional penetration tester. Some call me an ethical hacker, a white hat, or red teamer. In the heat of the...
Recent Comments