Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.
Read moreA New Look for Risk in Awareness Training
May 24 2023Changes in the way risk is viewed are leading to changes in the way training is conducted.
Read moreControlled outage used to keep malware marauders from gumming up the works. Learn what you can do to help in future...
Read moreThreat actors are circumventing geo-location-based security detections, using a combination of cybercrime-as-a-service platforms and the purchasing of local IP addresses.
Read moreA February 2022 attack, knocked the giant tire maker's North American operations offline for several days.
Read moreShorter certificate lifespans are beneficial, but they require a rethink of how to properly manage them.
Read moreCredible Handwriting Machine
May 23 2023In case you don’t have enough to worry about, someone has built a credible handwriting machine:
This is still a work in progress, but the project seeks to solve...
Read more
Interview With a Crypto Scam Investment Spammer
May 23 2023Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible...
Read moreSecurity vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.
Read moreThe climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.
Read more
Recent Comments