Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's...
Read moreFor line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?
Read moreBlack Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.
Read moreAussie PM says, “Shut down your phone every 24 hours for 5 mins” – but that’s not enough on its own
June 24 2023Don't treat rebooting your phone once a day as a cybersecurity talisman... here are 8 additional tips for better mobile phone security.
Read moreUPS Data Harvested for SMS Phishing Attacks
June 23 2023I get UPS phishing spam on my phone all the time. I never click on it, because it’s so obviously spam. Turns out that hackers have been harvesting actual...
Read moreThe impending regulations highlight the increasing importance of enhanced network security and regulatory compliance across the government sector.
Read moreMany organizations are unwittingly exposing users of their code repositories to repojacking when renaming projects, a new study shows.
Read moreDeception Technologies Have a Maturity Problem
June 23 2023While there's plenty of upside to rolling out deception technologies, it's not clear if cybersecurity leaders — or their organizations — are ready for them.
Read moreJob Seekers, Look Out for Job Scams
June 23 2023Scammers are setting out lures for people looking for work. If a position sounds too good to be true, it probably is.
Read moreUnder construction: The world's leading ransomware gang is workshopping ransomware for less obvious systems beyond Windows environments. Experts weigh in on how worried we should be.
Read more
Recent Comments