Researchers find differences in Kimsuky's operations that lead them to divide the APT into two groups: CloudDragon and KimDragon.
Read moreMore than half of business see the need for significant long-term changes to IT due to COVID-19, research finds.
Read moreThe report provides additional details on tactics of Russia's Foreign Intelligence Service following public attribution of the group to last year's SolarWinds attack.
Read moreThe Edge Pro Quote: Password Empowerment
May 7 2021Despite being a pain in the neck, passwords may hold a psychological purpose that security pros should take into account.
Read moreDefending Against Web Scraping Attacks
May 7 2021Web scraping attacks, like Facebook's recent data leak, can easily lead to more significant breaches.
Read moreTeaching Cybersecurity to Children
May 7 2021
A new draft of an Australian educational curriculum proposes teaching children as young as five cybersecurity:
The proposed curriculum aims to teach five-year-old children — an age at which...
Read more
John Bernard, a pseudonym used by a convicted thief and con artist named John Clifton Davies who’s fleeced dozens of technology startups out of an estimated $30 million, appears...
Read more11 Reasons Why You Sorta Love Passwords
May 7 2021We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.
Read moreThe Have I Been Pwned founder took the virtual stage at Black Hat Asia to share stories about his work and industrywide challenges.
Read moreOrganizations should apply principles of least privilege to mitigate threats, security researcher says.
Read more
Recent Comments