Attackers have already targeted electric vehicle (EV) charging stations, and experts are calling for cybersecurity standards to protect this necessary component of the electrified future.
Read moreIndigo Books Refuses LockBit Ransomware Demand
March 4 2023Canada's largest bookseller rejected the pressure of the ransomware gang's countdown timer, despite data threats.
Read morePolish Politician’s Phone Patrolled by Pegasus
March 4 2023A mayor backing Polish opposition elections in parliament has been targeted by special services with Pegasus spyware.
Read more3 Ways Security Teams Can Use IP Data Context
March 4 2023Innocently or not, residential proxy networks can obscure the actual geolocation of an access point. Here's why that's not great and what you can do about it.
Read moreWondering which cybercrime tools, techniques and procedures to focus on? How about any and all of them?
Read moreA two-month-long automated credential-stuffing campaign exposed personal information of Chick-fil-A customers, including birthdays, phone numbers, and membership details.
Read moreNick Weaver on Regulating Cryptocurrency
March 3 2023Nicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His conclusion:
Regulators, especially regulators in the United...
Read more
With critical infrastructures ever more dependent on the cloud connectivity, the world needs a more stable infrastructure to avoid a crippling cyberattack.
Read moreIBM Contributes Supply Chain Security Tools to OWASP
March 3 2023License Scanner and SBOM Utility will boost the capabilities of OWASP's CycloneDX Software Bill of Materials standard.
Read moreHighlights from the New U.S. Cybersecurity Strategy
March 3 2023The Biden administration today issued its vision for beefing up the nation's collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold...
Read more
Recent Comments