In cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other...
Read moreThinking of trying a bit of DDoSsing to get a feel for life at the fringes of the Dark Side? Don't do it!
Read moreA technique, dubbed the "Near-Ultrasound Inaudible Trojan" (NUIT), allows an attacker to exploit smartphones and smart speakers over the Internet, using sounds undetectable by humans.
Read moreIoT risk and security must get more attention from vendors and support from the marketplace.
Read moreHow CISOs Can Reduce the Danger of Using Data Brokers
March 28 2023Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and may expose the company to litigation.
Read moreCISA Releases Hunt Tool for Microsoft’s Cloud Services
March 28 2023CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.
Read moreAfter several weeks and more than 130 ransomware victims, GoAnywhere parent company Forta issues a statement.
Read moreIndicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.
Read moreFrom rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.
Read more
Recent Comments