Surveillance malware targets Libyan government entities, with possible links to a 2019 Egypt attack campaign.
Read moreActive threat hunting is the best protection against supply chain attacks like MOVEit and 3CX, experts say.
Read moreDoing Less With Less: Focusing on Value
June 12 2023Always reach for defense in depth with proposed security changes. Measure and test results, focus on items of greatest impact, and get C-suite members involved to drive better outcomes.
Read morePasskeys See Fresh Momentum With New Pilot Programs
June 10 2023Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.
Read moreIn the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.
Read moreProgress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting.
Read moreIn a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments.
Read moreIt's not enough to know how to better protect the enterprise — you have to be able to convince decision-makers that your plans are necessary.
Read moreOver that time, the group carried multiple tests to see if the exploit worked and to identify potential victims. It was like "turning the doorknob" to check for access,...
Read more
Recent Comments