Phishing attacks are online scams in which hackers pretend to represent reliable organizations to trick victims into disclosing private information...
The Homeland Security Systems Engineering and Development Institute, sponsored by the Department of Homeland Security and operated by MITRE, has released the 2021 Common Weakness Enumeration (CWE)...
The Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the National Association of Secretaries of State (NASS) and the National Association of State Election Directors (NASED),...
The U.S. Department of Energy (DOE) released Version 2.0 (V2.0) of the Cybersecurity Capability Maturity Model (C2M2), a tool designed to help companies of all types...
The No More Ransom project celebrates its fifth anniversary today after helping over six million ransomware victims recover their files and saving them almost €1 billion...
Signal has fixed a serious bug in its Android app that, in some cases, sent random unintended pictures to contacts without an obvious explanation. Although the...
Microsoft has released mitigations for the new PetitPotam NTLM relay attack that allows taking over a domain controller or other Windows servers. PetitPotam is a new...
Targets of Discord malware expand far beyond gamers. Discord has a malware problem. And although the platform is predominantly used by gamers, it turns out even...
This blog post was authored by Hasherezade In mid-July we responded to an incident that involved an attack on a Microsoft Exchange server. The threat actor...
JOHANNESBURG, July 23 (Reuters) – South Africa’s state-owned firm Transnet said on Friday it had identified and isolated the source of disruption to its IT systems...
A bipartisan group of senators is pushing a bill that would require the Cybersecurity and Infrastructure Security Agency to identify and respond to vulnerabilities and threats that target...
Recent Comments