Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.
Read moreAttackers had used the cloud-based infrastructure to target mailboxes and add forwarding rules to learn about financial transactions.
Read moreBoth companies have done their due diligence in creating connected-device networks, but the pervasiveness of the devices worries some security researchers.
Read moreAndariel, designated as a sub-group of the Lazarus Group APT, has historically targeted South Korean organzations.
Read moreTerbium Labs' products and services will become part of Deloitte's Detect & Respond lineup, the company confirms.
Read moreWhat Industrial Control System Vulnerabilities Can Teach Us About Protecting the Supply Chain
June 15 2021Older technologies used in industrial and critical infrastructure leave the sector highly vulnerable to attack, but organizations can take steps to better protect themselves.
Read moreWilson Center cybersecurity expert Meg King pinpoints five ambitious steps the administration should take, including a comprehensive national data breach notification protocol.
Read moreAndrew Appel on New Hampshire’s Election Audit
June 15 2021
Really interesting two part analysis of the audit conducted after the 2020 election in Windham, New Hampshire.
Based on preliminary reports published by the team of experts that...
Read more
How Does One Get Hired by a Top Cybercrime Gang?
June 15 2021The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot, a malware-as-a-service platform...
Read moreHow Does the Government Buy Its Cybersecurity?
June 15 2021The federal government is emphasizing cybersecurity regulation, education, and defense strategies this year.
Read more
Recent Comments