Attackers have already targeted electric vehicle (EV) charging stations, and experts are calling for cybersecurity standards to protect this necessary component of the electrified future.
Read moreIndigo Books Refuses LockBit Ransomware Demand
March 4 2023Canada's largest bookseller rejected the pressure of the ransomware gang's countdown timer, despite data threats.
Read morePolish Politician’s Phone Patrolled by Pegasus
March 4 2023A mayor backing Polish opposition elections in parliament has been targeted by special services with Pegasus spyware.
Read more3 Ways Security Teams Can Use IP Data Context
March 4 2023Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
Read moreA two-month-long automated credential-stuffing campaign exposed personal information of Chick-fil-A customers, including birthdays, phone numbers, and membership details.
Read moreWith critical infrastructures ever more dependent on the cloud connectivity, the world needs a more stable infrastructure to avoid a crippling cyberattack.
Read moreIBM Contributes Supply Chain Security Tools to OWASP
March 3 2023License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
Read moreThe Decider tool is designed to make the ATT&CK framework more accessible and usable for security analysts of every level, with an intuitive interface and simplified language.
Read more
Recent Comments