The REvil ransomware has a vulnerability that can be exploited to deactivate the malware before it encrypts files on an infected computer, a security researcher has...
A failure to validate subdomains within so-called ‘vanity URLs’ by Box, Zoom, and Google Docs created a powerful way to enhance their phishing campaigns, security researchers have revealed....
A “balkanization” of tech – driven by various countries’ needs to be technologically independent from their strategic competitors and adversaries – is underway, delegates to the...
Russian video streaming service RuTube has denied the complete loss of its source code after a cyber-attack timed to coincide with Russia’s ‘Victory Day’ brought the site down...
Infosec experts have welcomed the US National Institute of Standards and Technology’s (NIST’s) overhaul of its cybersecurity supply chain risk management guidance (C-SCRM). Developed in response to an...
Officials are highlighting significant spillover effects from the attack—including damage to infrastructure supporting wind farms—into Central Europe. Secretary of State Antony Blinken on Tuesday acknowledged a...
More than 2.7 million scams were removed from the internet in 2021 thanks to an expansion of the UK government’s Active Cyber Defence (ACD) program. Led...
The EU has blamed Russia for a powerful cyber-attack that disrupted satellite broadband services in Ukraine and “helped facilitate President Vladimir Putin’s invasion of the country”....
ANALYSIS The European Union (EU) wants to see greater standardization across European cybersecurity legislation and regulations, according to the bloc’s cybersecurity agency. The EU sees standards as...
A consumer survey suggests Americans are taking some steps to prepare for possible cyber warfare. The threat of cyberwarfare carried out against the United States is...
Recent Comments