Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due...
In recent years, the Internet and social media have devolved into a virtual minefield for corporate executives. The pandemic and sociopolitical unrest of 2020 further accelerated...
Since the emergence of COVID-19, fraudsters have launched fraud campaigns against critical services that serve as lifelines to the public. According to the Federal Trade Commission...
Posts highlighting the former and present administrations’ moves spanned online platforms Wednesday. Outgoing Trump-appointed officials turned to social media on Wednesday to reflect on their tenures...
Here are the news and updates you may have missed. The Trump administration cited security breaches sweeping U.S. government agencies and tech companies in imposing some...
The executive order encourages federal agencies to divest from unmanned aerial systems manufactured by China, Russia and Iran. In the final days prior to his departure...
Here’s what you need to know to protect federal employees and secure classified data. As the U.S. prepares for President-elect Biden’s administration, there will be a...
Zero-day vulnerabilities are one of the preferred attack techniques used by several attackers, and such attacks are increasing again. Threat actors are actively abusing new zero-day...
Recently, Russian-speaking scammers have been observed running a scam-as-a-service operation dubbed Classiscam. According to the Group-IB Computer Emergency Response Team (CERT-GIB), Classiscam comprises around 40 groups of cybercriminals,...
DNS infrastructure always remains an attractive target for cyber attackers and some recent targeted attacks on DNS highlight the increasingly sophisticated attack techniques used by hackers....
The discovery of Magecart card skimming infrastructure lurking behind a ‘bulletproof’ hosting service is just the latest example of how the notorious e-commerce heisters mask their...
Recent Comments