The Guardz research team discloses the existence of new information stealing malware on the Dark Web.
Read moreAmazon Prime Day Draws out Cyber Scammers
July 11 2023Cybercriminals lining up to score off Amazon Prime Day shoppers, who spent more than $22B in US online sales alone last year, according to estimates.
Read more10 Features an API Security Service Needs to Offer
July 11 2023Securing APIs is specialized work. Here's what organizations should look for when selecting an outside partner.
Read moreAPT35 Develops Mac Bespoke Malware
July 11 2023Iran-linked APT35 group crafted specific Mac malware when targeting a member of the media with new tools to add backdoors.
Read moreA consumer finance journalist and television personality took to Twitter to warn his followers about advertisements using his name and face to scam victims.
Read moreAn attack involves a multi-stage infection chain with custom malware hosted on Amazon EC2 that ultimately steals critical system and browser data; so far, targets have been located in...
Read moreAmid IT/OT convergence, organizations must adopt an "assume breach" mindset to stop bad actors and limit their impact.
Read moreEmployees now have the freedom to work wherever they want, which brings new challenges for security teams trying to protect data.
Read moreLog management tools help IT and security teams monitor and improve a system's performance by identifying bugs, cybersecurity breaches, and other issues that can create outages or compliance problems.
Read more
Recent Comments