Restoration teams must be part of a collaborative, initial response team to address costly downtime.
Read moreAdministrator of RSOCKS Proxy Botnet Pleads Guilty
January 25 2023Denis Emelyantsev, a 36-year-old Russian man accused of running a massive botnet called RSOCKS that stitched malware into millions of devices worldwide, pleaded guilty to two counts of computer...
Read moreArmis State of Cyberwarfare and Trends Report: 2022-2023 Highlights Global IT and Security Professionals’ Sentiment on Cyberwarfare
January 25 2023Respondents indicate organizations are unprepared to handle cyberwarfare, there's no one-size-fits-all response to ransomware, and cybersecurity spending is on the rise.
Read moreThe 2022-2023 Cloud Awards Announces Its Finalists
January 25 2023Chat Cybersecurity: AI Promises a Lot, But Can It Deliver?
January 25 2023Machine learning offers great opportunities, but it still can't replace human experts.
Read moreHackers cleverly cobbled together a suite of open source software — including a novel RAT — and hijacked servers owned by ordinary businesses.
Read moreMicrosoft to Block Excel Add-ins to Stop Office Exploits
January 24 2023The company will block the configuration files, which interact with Web applications — since threat actors increasingly use the capability to install malicious code.
Read moreSecurity and the Electric Vehicle Charging Infrastructure
January 24 2023When EVs and smart chargers plug in to critical infrastructure, what can go wrong? Plenty.
Read moreBulk Surveillance of Money Transfers
January 24 2023Just another obscure warrantless surveillance program.
US law enforcement can access details of money transfers without a warrant through an obscure surveillance program the Arizona attorney general’s office created...
Read more
Recent Comments