Apple didn't use the words "Triangulation Trojan", but you probably will.
Read moreThe company says its Themis Co-pilot for Outlook helps recipients discern business email compromise attacks, reducing false positives for security staff.
Read moreThe notorious APT15 used common malware tools and a third-generation custom "Graphican" backdoor to continue its information gathering exploits, this time against foreign ministries.
Read moreThe US Department of Justice adds litigators under its National Security Division to take on sophisticated cyber threats from adversarial nation-states.
Read moreGen Digital, the parent company of the security companies, is the latest victim in a rash of Cl0p attacks on the bug in the MOVEit transfer software, leading to...
Read moreINFOSEC23 — London — It's time to update what we think we understand about ransomware, including new defensive measures and how fast the attack response should be.
Read moreKeep Job Scams From Hurting Your Organization
June 22 2023From fake job listings that ding your reputation to fake job applicants who hack your network, job scams are a major threat.
Read moreWhy Malware Crypting Services Deserve More Scrutiny
June 22 2023If you operate a cybercrime business that relies on disseminating malicious software, you probably also spend a good deal of time trying to disguise or "crypt" your malware so...
Read moreA slew of critical advisories this week showcase an exploding edge device attack surface for SMBs, which have limited cybersecurity protection, visibility, and maintenance available.
Read moreEmerging Ransomware Group 8Base Doxxes SMBs Globally
June 22 2023A threat you've never heard of is using double extortion attacks on mom-and-pop shops around the globe.
Read more
Recent Comments