CISA and FBI urge organizations to remain vigilant to ransomware threats on holidays, including this Labor Day The Federal Bureau of Investigation (FBI) and the Cybersecurity...
The Microsoft 365 Defender Threat Intelligence Team has actively tracked a widespread credential phishing campaign using open redirector links. Attackers combine these links with social engineering...
Seldom does a single week pass that we don’t hear about yet another cybersecurity attack. Some are minor, but with growing frequency, they can be catastrophic...
The White House is ordering U.S. agencies to improve their logging capabilities to better track when attackers target their networks and data, according to a memo...
In conjunction with the kickoff of the college football season,Specops researchers analyzed more than 800 million compromised passwords to determine the popularity of Division 1 Football Bowl Subdivisionprograms and their...
The Cybersecurity and Infrastructure Security Agency (CISA) opened registration for the third annual President’s Cup Cybersecurity Competition. The President’s Cup is a nationwide competition that seeks to identify, recognize,...
While developers and security professionals aim to deliver secure applications quickly, development teams often lack certain coding knowledge. This secure development skills gap stems from the...
Computer voice interactions have come a long way. Not long ago, customer service phone systems relied on unreliable voice transcription, or touch-tone phone prompts to guide...
A security vulnerability in popular dating app Bumble could have enabled attackers to pinpoint other users’ precise location. Using fake Bumble profiles, security researcher Robert Heaton...
A critical security vulnerability in Microsoft’s Azure cloud database platform – Cosmos DB – could have allowed complete remote takeover of accounts, with admin rights to...
Recent Comments