"SandStrike," the latest example of espionage-aimed Android malware, relies on elaborate social media efforts and back-end infrastructure.
Read moreAn attack campaign using phishing attacks gives threat actors access to internal Dropbox code repositories, the latest in a series of attacks targeting developers through their GitHub accounts.
Read moreVulnerable people are lured by Facebook ads promising high-paying jobs, but instead they're held captive and put to work in Cambodia running cyber scams.
Read moreVitali Kremez Found Dead After Apparent Scuba Diving Accident
November 3 2022The renowned security researcher, ethical hacker, and cybersecurity phenom was found Wednesday by the US Coast Guard.
Read moreHow to Narrow the Talent Gap in Cybersecurity
November 3 2022We can bridge that gap by spreading the word about the opportunities, the requirements, and the many tools available to help applicants break into the field.
Read moreSMEs Must Plan for Recovery from Cybersecurity Attacks Amid Shifting Threats, Says MIT Technology Review Insights
November 2 2022A well-crafted — and tested — disaster recovery plan can minimize downtime and is a key component of business continuity plans.
Read moreCybersecurity concerns and education have not mitigated the overuse of the same passwords in 2022.
Read moreThe Art of Calculating the Cost of Risk
November 2 2022Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.
Read more
Recent Comments