Malware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates.
Read moreMakers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees.
Read moreWhen Leadership Style Is a Security Risk
August 23 2023Risk-aware leaders can be a cybersecurity advantage. Their flexible leadership style and emphasis on security first help set the tone and demonstrate a commitment to avoiding risk.
Read moreThe Physical Impact of Cyberattacks on Cities
August 22 2023Understanding potential threats and regularly updating response plans are the best lines of defense in the new world of cyberattacks.
Read more‘Cuba’ Ransomware Group Uses Every Trick in the Book
August 22 2023How a Russian cybercrime group using Cuban Revolution references and iconography has emerged as one of the most profitable ransomware operations.
Read moreChinese APT Targets Hong Kong in Supply Chain Attack
August 22 2023Dubbed Carderbee, the group used legitimate software and Microsoft-signed malware to spread the Korplug/PlugX backdoor to various Asian targets.
Read moreSecurity vendor will not say if attackers are already actively exploiting the flaw, as some reports have claimed.
Read moreThe updated cybersecurity reporting rule from the National Credit Union Administration takes effect Sept. 1.
Read moreTesla Data Breach Investigation Reveals Inside Job
August 22 2023The carmaker also reported it's taken legal action against the former employees involved in the data breach, which involved more than 75,000 names.
Read more
Recent Comments