The Chaos ransomware-builder was known for creating destructor malware that overwrote files and made them unrecoverable -- but the new Yashma version finally generates binaries that can encrypt files...
Read moreThe malware's abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
Read morePhysical Security Teams’ Impact Is Far-Reaching
May 27 2022Here's how physical security teams can integrate with the business to identify better solutions to security problems.
Read moreTaking the Danger Out of IT/OT Convergence
May 27 2022The Colonial Pipeline attack highlighted the risks of convergence. Unified security provides a safer way to proceed.
Read moreBroadcom Snaps Up VMware in $61B Deal
May 26 2022Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.
Read moreMicrosoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.
Read moreLacework Announces Layoffs, Restructuring
May 26 2022The cloud-security company blames "seismic" market shifts for shakeup.
Read moreNearly half of the world's largest websites use externally generated JavaScript that makes them ripe targets for cyberattackers interested in stealing data, skimming credit cards, and executing other malicious...
Read moreTwitter Fined $150M for Security Data Misuse
May 26 2022Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.
Read moreThe FDA’s New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand
May 26 2022The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.
Read more
Recent Comments