Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success
Every company has some level of tech debt. Unless you're a brand new start-up, you most likely have a patchwork...
Every company has some level of tech debt. Unless you're a brand new start-up, you most likely have a patchwork...
Thousands of Openfire XMPP servers are unpatched against a recently disclosed high-severity flaw and are susceptible to a new exploit,...
The U.S. Justice Department (DoJ) on Wednesday unsealed an indictment against two founders of the now-sanctioned Tornado Cash cryptocurrency mixer...
The North Korea-linked threat actor known as Lazarus Group has been observed exploiting a now-patched critical security flaw impacting Zoho...
Public Wi-Fi, which has long since become the norm, poses threats to not only individual users but also businesses. With...
A new financially motivated operation is leveraging a malicious Telegram bot to help threat actors scam their victims. Dubbed Telekopye,...
A recently patched security flaw in the popular WinRAR archiving software has been exploited as a zero-day since April 2023,...
The SmokeLoader malware is being used to deliver a new Wi-Fi scanning malware strain called Whiffy Recon on compromised Windows...
We’re down to the final weeks of registration for mWISE, the highly targeted, community-focused cybersecurity conference from Mandiant, now part...
The North Korean state-backed hacker group tracked as Lazarus has been exploiting a critical vulnerability (CVE-2022-47966) in Zoho's ManageEngine ServiceDesk...
Proof-of-concept exploit code is now available for a critical Ivanti Sentry authentication bypass vulnerability that enables attackers to execute code...
Two vulnerabilities affecting some version of Jupiter X Core, a premium plugin for setting up WordPress and WooCommerce websites, allow...
The Federal Bureau of Investigation warned that patches for a critical Barracuda Email Security Gateway (ESG) remote command injection flaw...
Ransomware threat actors are spending less time on compromised networks before security solutions sound the alarm. In the first half of...
Cybercriminals behind the Smoke Loader botnet are using a new piece of malware called Whiffy Recon to triangulate the location...
The dwell time of cyber-attacks fell to a median of eight days in the first half of 2023, but attackers...
The French national employment agency, Pôle emploi, has been hit by a cyber-attack potentially exposing critical information of up to...
Security researchers have detected a 178% increase in sextortion emails between the first half of 2022 and the same period...
A UK local authority has warned citizens to watch out for follow-on scams after it was breached in a ransomware...
An Oxford teenager has been found responsible for a series of hacking incidents impacting big-name brands, as part of the...
Cybersecurity researchers have unveiled a complex web of interconnected ransomware strains that trace their origins back to a common source:...
Data from 2.6 million users of Duolingo, a language learning platform with over 74 million monthly users, has been leaked...
Draft post-quantum cryptography (PQC) standards have been published by the US National Institute of Standards and Technology (NIST). The new...
The Federal Bureau of Investigation (FBI) has issued a stark warning to cryptocurrency firms regarding a surge in blockchain activity...