Researchers at Varonis Threat Labs discovered that some Salesforce sites were improperly deactivated or unmaintained SalesforceGhost Sites. Threat actors can...
The US Cybersecurity and Infrastructure Security Agency (CISA) is taking over the administration of the .GOV top-level domain (TLD) as its new policy and management authority....
Unpatched network-attached storage (NAS) devices are targeted in ongoing attacks where the attackers try to take them over and install cryptominer malware to mine for cryptocurrency....
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s...
Threat actors have successfully targeted defense contractors over the years because they haven’t fully secured their networks, thus creating serious vulnerabilities in U.S. national security. To...
Cybersecurity has continually increased in priority and spending in recent years. Industry insights show that the federal government had to pay more than 13.7 billion dollars to counter...
New Tessian report reveals that cybersecurity jobs weathered Covid-19 storm and explains why industry needs to address issue with equal pay to encourage more women to...
The Cybersecurity and Infrastructure Security Agency (CISA) has awarded the University of Texas at San Antonio Center for Infrastructure Assurance and Security (CIAS) a $1.2 million...
The ransomware market, fueled by coronavirus pandemic turbulence, has become the biggest single money earner for cybercriminals, according to a new report. Threat hunting and cyber-intelligence...
(Bloomberg) — Newly discovered flaws in Microsoft Corp.’s software for email and contacts has raised concerns at the highest levels of the U.S. government, which is...
A mysterious cybercrime group apparently driven by profit has been targeting industrial organizations in Europe, Asia and North America as part of an information theft campaign....
Recent Comments