A malware campaign is using fake OnlyFans content and adult lures to install a remote access trojan known as ‘DcRAT,’...
It’s no secret that, today, the diversity of R&D allows companies to rapidly introduce new applications and push changes to existing ones. But this great complexity...
This is the second part of two articles. Please read the first article here. DevOps has made standardized application architectures obsolete. It’s time to rethink security instead....
The Department of Homeland Security’s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect against, and respond to...
The directive now mandates incident reporting and reviews described in the administration’s voluntary guidelines for the sector. Working with the Cybersecurity and Infrastructure Security Agency, the...
Threema, the end-to-end-encrypted messaging service, has won a landmark court case in Switzerland’s highest court that means the Swiss company won’t be forced to betray its privacy-focused...
A web server hosting the domain for a local government in the United States was recently breached by advanced hackers taking advantage of old vulnerabilities in...
Proofpoint, Inc. and Ponemon Institute released the results of a new study on “The Cost of Cloud Compromise and Shadow IT.” The average cost of cloud account compromises reached $6.2...
With the Colonial Pipeline ransomware attacks that caused widespread East Coast fuel shortages still fresh in our minds, new WhiteHat Security research has found that application...
ThycoticCentrify, a provider of cloud identity security solutions formed by the merger of privileged access management (PAM) leaders Thycotic and Centrify, announced new research that reveals more than...
Threat Intelligence has become a bucket for a lot of things – from Indicators of Compromise (IOC), to malware reverse engineering, to deep and dark web...
Recent Comments