Court grants company's bid to shut down infrastructure used in recent campaigns against Office 365 users.
Read moreDrone Path Often Reveals Operator’s Location
July 7 2020The threat posed by drones to critical infrastructure and other operational technology is made more serious by the inability of law enforcement to locate operators, researchers say.
Read moreCosmic Lynx takes a sophisticated approach to business email compromise and represents a shift in tactics for Russian cybercriminals.
Read moreCosmic Lynx takes a sophisticated approach to business email compromise and represents a shift in tactics for Russian cybercriminals.
Read moreDon't be distracted by flashy advanced attacks and ignore the more mundane ones.
Read moreApplying the 80-20 Rule to Cybersecurity
July 7 2020How security teams can achieve 80% of the benefit for 20% of the work.
Read moreThe two extraditions of business email compromise attackers indicate a step forward for international law enforcement collaboration.
Read moreThe US Cybersecurity and Infrastructure Security Agency encourages organizations to patch a critical flaw in the BIG-IP family of application delivery controllers, as firms find evidence that attackers are...
Read moreSince at least May 2019, the state-sponsored threat actor has stolen card data from dozens of retailers, including major US firms.
Read more
Recent Comments