Google Docs Comments Weaponized in New Phishing Campaign
January 6 2022Attackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.
Read moreAttackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.
Read moreA suspected ransomware attack has led Bernalillo County officials to take systems offline and sever network connections.
Read moreCloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.
Read moreA Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.
Read moreThe prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.
Read moreA handful of malicious tools that emerged last year showed threat actors may be getting more serious about attacking Apple macOS and iOS environments.
Read moreZero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.
Read moreThe Malsmoke attack group is behind a campaign that has exploited the Microsoft e-signature verification tool to target 2,100 victims.
Read moreStolen credentials tied to cyberattack incidents at 17 "well-known" online retailers, restaurant chains, food delivery services.
Read more
Recent Comments