"SandStrike," the latest example of espionage-aimed Android malware, relies on elaborate social media efforts and back-end infrastructure.
Read moreAn attack campaign using phishing attacks gives threat actors access to internal Dropbox code repositories, the latest in a series of attacks targeting developers through their GitHub accounts.
Read moreVulnerable people are lured by Facebook ads promising high-paying jobs, but instead they're held captive and put to work in Cambodia running cyber scams.
Read moreVitali Kremez Found Dead After Apparent Scuba Diving Accident
November 3 2022The renowned security researcher, ethical hacker, and cybersecurity phenom was found Wednesday by the US Coast Guard.
Read moreHow to Narrow the Talent Gap in Cybersecurity
November 3 2022We can bridge that gap by spreading the word about the opportunities, the requirements, and the many tools available to help applicants break into the field.
Read moreSMEs Must Plan for Recovery from Cybersecurity Attacks Amid Shifting Threats, Says MIT Technology Review Insights
November 2 2022A well-crafted — and tested — disaster recovery plan can minimize downtime and is a key component of business continuity plans.
Read moreCybersecurity concerns and education have not mitigated the overuse of the same passwords in 2022.
Read moreThe Art of Calculating the Cost of Risk
November 2 2022Insurance and legislation affect how enterprises balance between protecting against breaches and recovering from them.
Read moreNetskope Threat Research: Next Generation of Phishing Attacks Uses Unexpected Delivery Methods to Steal Data
November 2 2022Report reveals new top sources of fake login page referrals, rise of fake third-party cloud apps used to trick users.
Read moreMusk’s Twitter-Verification Payment Tease Spurs Cyberattackers
November 2 2022A proposed plan to charge users for the platform's coveted blue check mark has, unsurprisingly, inspired attackers to try to dupe people into giving up their credentials.
Read more
Recent Comments