The critical infrastructure experts upheld common cybersecurity standards as a key to resilient networks and private sector collaboration. Leadership across...
Here are the news and updates you may have missed. President Joe Biden has directed the intelligence community to evaluate the widespread intrusion into federal agencies...
Technology never stands still, so building new solutions based on requirements drafted in the past will always result in out of data solutions. Imagine traveling in...
Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability in SAP’s enterprise software. The functional exploit goes...
A researcher detailed how he chained a series of vulnerabilities to achieve remote code execution (RCE) on an Amazon Kindle e-reader. Researcher Yogev Bar-On, of Readlmode Labs, who...
In December 2020, the cybersecurity firm FireEye discovered one of the worst cyberattack in the U.S.’s history. While the full ramifications of this attack remain to be seen,...
After a data breach, much of that stolen personal and sometimes highly personally identifiable information (PII) is sold on markets residing within the dark web. But,...
With millions of people working from home at present, and likely into the future, the enterprise perimeter has all but dissolved. In the process, organizations are...
The past year has been a rollercoaster of history-defining events that we’ve collectively watched and experienced in a state of disbelief. While we’ve been focused on...
This past year was a turbulent one across all industries and sectors. From the opening days of the virus, to the shutdowns that followed and now...
Threat hunting company Group-IB published a report on a new scam scheme that they named “Classiscam.” The report reveals 40 or more groups currently running this scheme across Russia...
Recent Comments