The proliferation of cybercrime on the internet has given rise to thousands of criminal communities. These corners of the internet,...
The explosion of high-profile ransomware attacks has been dominating the news in the IT sector of late, but most of the time – and for years,...
The insider threat is not a new risk for security teams, but with ransomware, phishing and myriad other “flashy” external threats targeting organizations, it has been...
Dutch cybersecurity firm Tesorion has released a free decryptor for the Lorenz ransomware, allowing victims to recover some of their files for free without paying a...
The ethical hacking community saw a big boost this month, with the news that the US Supreme Court has tightened up the definition of unauthorized access. Previously,...
The agency plans to keep updating the narrow list based on feedback from cybersecurity professionals. The Cybersecurity and Infrastructure Security Agency released a list of two...
Microsoft has already attributed the broad-scale compromise of its on-premises mail servers to Chinese nation-state actors. The White House will soon officially assign responsibility for an...
In reality, we have almost no power over our data and who uses it for what, according to the study. Users should not ultimately be the ones...
A universal cross-site scripting (uXSS) vulnerability in Microsoft Edge’s translation function left users open to attack, regardless of which website they visited, security researchers have claimed. Netting a...
The REvil ransomware operation have added a Linux encryptor to their arsenal that’s designed to target and encrypt Vmware ESXi virtual machines. BleepingComputer reports that security researcher MalwareHunterTeam...
Mira LaCous, Chief Technology Officer (CTO) of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security. Security: What...
Recent Comments