The nation of Jordan begins work on a national cybersecurity framework to align with international practices and better mitigate threats.
Read moreThe ransomware landscape is energized with the emergence of smaller groups and new tactics, while established gangs like LockBit see fewer victims.
Read moreA severe security vulnerability allows credentials for the power meters to continuously transmit in cleartext, allowing device takeover.
Read moreA criminal crowd-sourcing campaign has led to swift adoption of the stealer, which can pilfer key computer data, credentials from browsers and chat apps, and cryptocurrency from multiple wallets.
Read moreIt's still important to use other security measures, such as strong passwords and two-factor authentication, to protect your data.
Read more"Do as we say, not as we do!" - The patches took ages to come out, but don't let that lure you into taking ages to install them.
Read moreRorschach Ransomware: What You Need to Know
June 20 2023Learn how the latest ransomware variant has heightened attack execution speed and what that means for cybersecurity operations.
Read moreTo adequately address privacy, manufacturers need to think differently about data.
Read moreOne, sadly, has died, and two are heading to prison, but for Kim Dotcom, the saga goes on...
Read moreName That Toon: Time to Spare?
June 19 2023Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments