The Clop ransomware gang has told BleepingComputer they are behind the MOVEit Transfer data-theft attacks, where a zero-day vulnerability was...
Reps. Elissa Slotkin, D-Mich., and Mike Gallagher, R-Wisc., are leading the three-month task force. A new task force will look for legislative tools that could be...
The Homeland and Cyber Threat Act would amend the Foreign Sovereign Immunities Act to give Americans legal recourse for damages caused by foreign hackers. A bipartisan...
The developers of the Kentico CMS have patched a critical vulnerability that could be exploited to compromise backend databases. The vulnerability was disclosed by Obrela Labs penetration tester...
A platform for sharing and requesting indicators of compromise (IoCs) associated with different malware strains is the latest open source intelligence (OSINT) service launched by Abuse.ch....
The security and privacy of Apple’s Bluetooth location-tracking system has earned praise from researchers who uncovered two implementation flaws in the technology. Apple’s OF (Offline Finding)...
Bloomberg has reported that a group of hackers have breached a database containing security camera feeds collected by Verkada Inc., a Silicon Valley startup. The database includes live...
Researchers from the Counter Threat Unit (CTU) at Secureworks have discovered a possible link to China while examining how SolarWinds servers were used to deploy malware. In late 2020, Secureworks CTU researchers observed...
Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who...
Veritas Technologies revealed new research that highlights the dangers of mis-using instant messaging (IM) and business collaboration tools: 71% of office workers globally – including 68%...
The new year is upon us, and as such, it is a time to reflect on what worked over the past 12 months, and more importantly,...
Recent Comments