A ready-made, low-complexity path to pwning the popular enterprise VPN clients for remote workers is now circulating in the wild.
Read more6 Attack Surfaces You Must Protect
June 22 2023More connectivity means more potential ways into your enterprise, so securing every main attack surface is imperative.
Read moreCamaro Dragon (Mustang Panda) is spreading a malware variant of WispRider quickly across the globe even through air gaps, often unbeknown to users.
Read moreCompliance, seen as a burden for businesses, is being passed to overloaded IT departments — leaving organizations unsure if they're compliant at all.
Read moreLessons From a Pen Tester: 3 Steps to Stay Safer
June 22 2023From hardening Windows systems to adding access control and segmenting the network, there are steps organizations can take to better secure corporate data.
Read moreThe zero-day security bugs are being used to deploy the sophisticated but "odd" TriangleDB spying implant on targeted iOS devices.
Read moreThe company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff.
Read moreThe notorious APT15 used common malware tools and a third-generation custom "Graphican" backdoor to continue its information gathering exploits, this time against foreign ministries.
Read moreThe US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states.
Read more
Recent Comments