In mid-October, a new post, written in Russian, appeared on a cybercriminal forum. It advertised network access to a large electronics manufacturer, including backups of corporate...
Over the last few months, the financial sector, as well as many other industries, has had to adjust and make the shift to remote set-ups almost...
For businesses without access to top data/security experts, working remotely during the pandemic has made them a top target for hackers. To discuss cybersecurity best practices businesses...
“How can I trust my heart when it’s running on proprietary code?” With this unsettling question, cybersecurity researcher Marie Moe – who successfully hacked her own pacemaker –...
The University of West Florida has been re-designated by the National Security Agency and Department of Homeland Security as the Southeast Centers of Academic Excellence in...
Cyberpion released research today showing that most (83%) of the top U.S. retailers have connections to a vulnerable third-party asset, and nearly half of them (43%) have...
Despite the explosive growth in API usage worldwide, many security and development teams are unable to answer basic questions about their API programs – like how...
Not long ago, most business was conducted within the confines of office walls, that is, until 2020. This year, work as we know it evolved practically overnight, as employees went home with company...
The Information Security Forum (ISF), trusted source for strategic and practical guidance on information security and risk management, has announced the organization’s outlook for the top global security...
The CERT Coordination Center (CERT/CC) has released information on 33 vulnerabilities, known as AMNESIA:33, affecting multiple embedded open-source Transmission Control Protocol/Internet Protocol (TCP/IP) stacks. A remote attacker could...
Recent Comments