The criminals didn't implant any malware. The attack was orchestrated via malevolent configuration changes.
Read moreCompany fortifies its ability to help organizations prepare and obtain CMMC certification.
Read moreApathy is Your Company’s Biggest Cybersecurity Vulnerability — Here’s How to Combat It
August 23 2022Make security training more engaging to build a strong cybersecurity culture. Here are four steps security and IT leaders can take to avoid the security disconnect.
Read moreMeta Takes Offensive Posture With Privacy Red Team
August 23 2022Engineering manager Scott Tenaglia describes how Meta extended the security red team model to aggressively protect data privacy.
Read morePatients face possible disclosure of protected health information (PHI) to Meta, Facebook's parent company, resulting from an incorrect configuration of an online tracking tool.
Read moreGoogle researchers say the nation-state hacking team is now employing a data-theft tool that targets Gmail, Yahoo!, and Microsoft Outlook accounts using previously acquired credentials.
Read moreSignal Phone Numbers Exposed in Twilio Hack
August 23 2022Twilio was hacked earlier this month, and the phone numbers of 1,900 Signal users were exposed:
Here’s what our users need to know:
- All users can rest assured that... Read more
Fake DDoS Protection Alerts Distribute Dangerous RAT
August 22 2022Security vendor Sucuri says adversaries are injecting malicious JavaScript into numerous WordPress websites that triggers phony bot-related checks.
Read moreHD Moore's company has rebranded its IT, IoT, and OT asset discovery tool as the platform rapidly evolves.
Read moreAlternative cloud providers offer streamlined capabilities for penetration testing, including more accessible tools, easy deployment, and affordable pricing.
Read more
Recent Comments