In what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.
Read moreCISOs Are Focused on These 3 Trends. Are You?
January 7 2023The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.
Read moreThe Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.
Read moreSecurity vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations.
Read moreDon’t Be Blindsided by Software Bills of Materials
January 6 2023It's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.
Read moreThe role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges.
Read moreRackspace Sunsets Email Service Downed in Ransomware Attack
January 6 2023The hosting services provider shared new details on the breach that took down its Hosted Exchange Email service.
Read moreHow Confidential Computing Can Change Cybersecurity
January 6 2023Encrypting data while in use, not just in transit and at rest, closes one more avenue of cyberattack.
Read moreA data dump of Twitter user details on an underground forum appears to stem from an API endpoint compromise and large-scale data scraping.
Read more
Recent Comments