Cybersecurity firm Emsisoft has released a free decryption tool to help Diavol ransomware victims recover their files without paying a ransom. Diavol ransomware victims can download...
Senators left and right are using the Colonial Pipeline hack and Russia’s invasion of Ukraine as reasons to both regulate and avoid regulating cryptocurrencies. Another key...
The Cyberspace Solarium Commission emerged due to the late John McCain’s frustration with current U.S. doctrine on what should trigger a “use of force.” The possibility...
When a business goes offline, its customers are inconvenienced and its operators lose money. The outage might also be evidence of a cyber-attack. Monitoring web services and...
A US entrepreneur who pocketed millions of dollars after falsifying bank statements to generate investment for his cyber-fraud prevention firm has pleaded guilty to securities fraud....
A year-on-year surge has been observed in the number of security vulnerabilities found in the WordPress ecosystem. The number of flaws reported in plugins and themes for WordPress...
HackerOne has denied it is blocking payments to Ukrainian bug bounty hunters after hackers in the country were denied access to money earned through the platform....
UPDATED The maintainers of OpenSSL, the open source library used by millions of web applications to encrypt communications, have released updates addressing a ‘high’ severity denial of...
Hackers target poorly secured Microsoft SQL and MySQL database servers to deploy the Gh0stCringe remote access trojans on vulnerable devices. Gh0stCringe, aka CirenegRAT, is a variant...
The document is targeted at auditors—internal and external to an organization—who are set to play a central role in cybersecurity policy under a May executive order...
Recent Comments