Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform
In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more...
In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more...
China-linked APT group Tropic Trooper has been spotted previously undocumented malware written in Nim language. Check Point Research uncovered an activity...
The Israeli surveillance firm NSO Group revealed that its Pegasus spyware was used by at least five European countries. The...
Taiwanese company QNAP is addressing a critical PHP vulnerability that could be exploited to achieve remote code execution. Taiwanese vendor...
One of the most popular zip programs around, 7-Zip, now offers support for “Mark of the Web” (MOTW), which gives...
MEGA, the cloud storage provider and file hosting service, is very proud of its end-to-end encryption. It says it couldn’t...
Researchers at ETH Zurich discovered several critical flaws in the MEGA cloud storage service that could have allowed the decryption...
Both AWS and Azure developer tools provide key efficiencies in your DevOps environment, learn the comparison between tools, any overlap,...
Cyber Spetsnaz is targeting government resources and critical infrastructure in Lithuania after the ban of Russian railway goods Cyber Spetsnaz...
Researchers from Malwarebytes warns that the Magecart skimming campaign is active, but the attacks are more covert. Magecart threat actors...
Threat actors are using the Rig Exploit Kit to spread the Dridex banking trojan instead of the Raccoon Stealer malware....
US Flagstar Bank disclosed a data breach that exposed files containing the personal information of 1.5 million individuals. US-based Flagstar...
ToddyCat is a relatively new APT actor that we have not been able to relate to other known actors, responsible...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Researchers linked a new APT group, tracked as ToddyCat, to a series of attacks targeting entities in Europe and Asia...
Experts discovered a new kind of Windows NTLM relay attack dubbed DFSCoerce that allows taking control over a Windows domain. Researchers warn...
A researcher has found a way to generate a fingerprint of your device from your installed Google Chrome extensions, and...
Experts identified a spike in phishing content delivered via Azure Front Door (AFD), a cloud CDN service provided by Microsoft....
Matthew Gatrel, a 33-year-old man from St. Charles, Illinois, has been sentenced to two years in prison for running websites...
Major CDN provider Cloudflare has had a terrible time today with a major outage! Many major websites, including some huge...
Introduction When reports of a cyberattack appear in the headlines, questions abound regarding who launched it and why. Even if...
The Attorney General has issued an arrest warrant for a hacker who targeted a NATO think tank in Germany for...
Google Project Zero experts disclosed details of a 5-Year-Old Apple Safari flaw actively exploited in the wild. Researchers from the...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...