A Detailed Look at the Conti Ransomware Gang
March 29 2022Based on two years of leaked messages, 60,000 in all: The Conti ransomware gang runs like any number of businesses around the world. It has multiple departments, from HR and...
Read moreBased on two years of leaked messages, 60,000 in all: The Conti ransomware gang runs like any number of businesses around the world. It has multiple departments, from HR and...
Read moreWhile low-code and no-code tools make application development more flexible, they open up security flaws.
Read moreNew vulnerability study shows how "attacker economies of scale" have shaped the risk landscape.
Read moreThe FBI's latest Private Industry Notification warns the energy sector that the group behind Triton is still up to no good.
Read moreCompanies must prepare effective, data-driven threat-response strategies as they monitor for reputational risks as well as cyberattacks.
Read moreCVE-2022-1096 - another mystery in-the-wild 0-day in Chrome... check your version now!
Read moreCVE-2022-1096 - another mystery in-the-wild 0-day in Chrome... check your version now!
Read moreWhether it's PCI-DSS, SSDLC, or GDPR, the criteria that security standards expect businesses to uphold are neither realistic or feasible.
Read moreEvgeny Viktorovich Gladkikh tried to cause catastrophic damage to Saudi oil refinery in 2017 via the Triton/Trisis malware, the US has alleged.
Read moreAbstract: The retreating ice cover of the Central Arctic Ocean (CAO) fuels speculations on future fisheries. However, very little is known about the existence of harvestable fish stocks...
Read more
Recent Comments