A security researcher and system administrator has developed a tool that can help users check for manifest mismatches in packages...
INTERVIEW Aaron Portnoy confesses to periodic bouts of imposter syndrome, despite having carved out a distinguished career in offensive security. Among other things, Portnoy – now principal scientist...
D-Box said it is recovering from a ransomware attack that partially paralyzed many of its IT systems earlier this month. In a statement issued on Wednesday (July 29), the Canadian...
Coalition announced the results of its H1 2021 Cyber Insurance Claims Report. Coalition analyzed claims data through June 2021 from 50,000 customers in the United States and Canada....
Deborah Golden, Deloitte Risk & Financial Advisory’s U.S. Cyber and Strategic Risk leader, shares insights on the most significant barriers to widespread digital identity adoption and the...
As COVID-19 ravaged hospitals’ patient care units last year, opportunistic criminals saw an opportunity to pluck low-hanging fruit: Hacking groups decided to breach and ransom healthcare...
Half (49%) of U.S. WFH employees say they continue to use their personal laptop or computer as they work remotely, according to Morphisec’s 2021 WFH Employee Cybersecurity Threat...
Google is emailing Android users to let them know that, starting late September, they will no longer be able to log in to their Google accounts on...
The Python Package Index (PyPI) registry has removed several Python packages this week aimed at stealing users’ credit card numbers, Discord tokens, and granting code execution capabilities...
A Tallinn man was arrested a week ago in Estonia under suspicion that he has exploited a government photo transfer service vulnerability to download ID scans...
The single largest risk factor reported by respondents is the influx in remote work. Three in four public sector technology practitioners flag remote work policies as...
Recent Comments