Most security pros believe their responses could be dramatically quicker were the right logs available, and usually they're not.
Read moreOne-time reactive measures can't keep up. It's time to be proactive and pick our swords and not just our shields.
Read moreIPO is the highest valued in cybersecurity history, according to reports.
Read moreSMB Worm Targeting EternalBlue Vuln Spreads to US
June 30 2021"Indexsinas" is the latest threat designed to exploit Windows servers that remain vulnerable to an NSA-developed exploit Microsoft patched more than four years ago.
Read moreA previously unknown flaw in Western Digital's older network-attached storage systems allowed unauthenticated commands to trigger a factory reset, formatting the hard drives, says the company after its preliminary...
Read moreImpersonation Becomes Top Phishing Technique
June 30 2021A new report finds IT, healthcare, and manufacturing are the industries most targeted by phishing emails.
Read moreA previously unknown flaw in Western Digital's older network-attached storage systems allowed unauthenticated commands to trigger a factory reset, formatting the hard drives, says the company after its preliminary...
Read moreApple security expert Patrick Wardle found that some macOS malware written for the new M1 processor can bypass anti-malware tools.
Read moreIntl. Law Enforcement Operation Takes Down DoubleVPN
June 30 2021The VPN service allegedly provided a means for cybercriminals to target their victims, Europol officials report.
Read more
Recent Comments