APT37 is among a growing list of threat actors that have switched to Windows shortcut files after Microsoft blocked macros last year.
Read moreThe cyberattack campaign, similar to one to spread the Rhadamanthys Stealer, is part of a larger trend by attackers to use malvertising as initial access for ransomware and other...
Read moreNIST has released a draft of Special Publication1800-38A: “Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of Quantum Safe Cryptography.” It’s only four pages long, and...
Read moreImproving the security of the software development process is key to thwarting bad actors.
Read moreMandiant CEO Kevin Mandia explains why a recently revealed targeted attack by a cyber-espionage group out of China rivals the SolarWinds attack in its complexity, and weighs in on...
Read moreIn part two of this three-part series, Microsoft synthesizes the impact of IoT/OT security challenges and offers tips for strengthening security there.
Read moreAccording to the ESG Study, 92% of organizations have experienced at least one security incident related to insecure APIs in the past year.
Read moreApple delivers first-ever Rapid Security Response “cyberattack” patch – leaves some users confused
May 2 2023Just when we'd got used to three-numbered versions, such as "13.3.1", here comes an update suffix, bringing you "13.3.1 (a)"...
Read moreNever before has cyber been higher on the FBI's list of priorities. Will more money allow the feds to make a greater impact?
Read more
Recent Comments