Iran-Backed Charming Kitten APT Eyes Kinetic Ops, Kidnapping
December 17 2022The not-so-charming APT's intelligence-gathering initiatives are likely being used by the Iranian state to target kidnapping victims.
Read moreThe not-so-charming APT's intelligence-gathering initiatives are likely being used by the Iranian state to target kidnapping victims.
Read moreThe MirrorFace group has deployed popular malware LodeInfo for spying and data theft against certain members of the Japanese House of Representatives.
Read moreAccelerating security challenges and the increasing footprint of edge and IoT devices call for zero-trust principles to drive cyber resiliency.
Read moreEffective customer data management helps companies avoid data breaches and the resulting cascade of issues. From validating "clean" data to centralized storage and a data governance strategy, management steps...
Read moreCheck out our slideshow detailing the emerging cybersecurity trends in cloud, creating a defensible Internet, malware evolution, and more that lit up audiences in London.
Read moreThe most recent iPhone update—to version 16.1.2—patches a zero-day vulnerability that “may have been actively exploited against versions of iOS released before iOS 15.1.”
News:
Apple said security researchers...
Read more
SHA-1 was deprecated in 2011. NIST has set the hashing algorithm's final retirement date to Dec. 31, 2030.
Read moreZero trust is useful in some situations, but organizations should not be trying to fit zero trust everywhere. In some cases, identity-based networking is an appropriate alternative.
Read moreNew features bring greater visibility and context into SaaS applications access and activity.
Read moreInfraGard's members include key security decision-makers and stakeholders from all 16 US civilian critical-infrastructure sectors.
Read more
Recent Comments