Tuta Mail Adds New Quantum Resistant Encryption To Protect Email
Tuta Mail has announced TutaCrypt, a new post-quantum encryption protocol to secure communications from powerful and anticipated decryption attacks. Tuta...
Tuta Mail has announced TutaCrypt, a new post-quantum encryption protocol to secure communications from powerful and anticipated decryption attacks. Tuta...
New York-based securities lending platform EquiLend Holdings confirmed in data breach notification letters sent to employees that their data was...
Security researchers have created a knowledge base repository for attack and defense techniques based on improperly setting up Microsoft's Configuration...
Roku has disclosed a data breach impacting over 15,000 customers after hacked accounts were used to make fraudulent purchases of...
Okta denies that its company data was leaked after a threat actor shared files allegedly stolen during an October 2023...
Security researchers have uncovered a trend involving the exploitation of 1-day vulnerabilities, including two in Ivanti Connect Secure VPN. The flaws,...
The BianLian threat actor has been observed shifting toward extortion-only activities, according to recent findings by GuidePoint’s Research and Intelligence...
Microsoft Threat Intelligence has uncovered a supply chain attack by the North Korea-based threat actor Diamond Sleet (ZINC) involving a...
Microsoft observed a surge in cyberattacks targeting identities in 2023, with attempted password-based attacks increasing by more than tenfold in...
Threat actors are misusing OAuth applications as an automation tool in financially motivated attacks. OAuth is an open standard for...
Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star...
Microsoft discovered, responsibly disclosed, and helped remediate four vulnerabilities that could be remotely exploited by unauthenticated attackers in Perforce Helix...
Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and...
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern...
The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our...
Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations...
Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The developers of the Leather cryptocurrency wallet are warning of a fake app on the Apple App Store, with users...
VMware released security updates to fix critical sandbox escape vulnerabilities in VMware ESXi, Workstation, Fusion, and Cloud Foundation products, allowing...
The Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) has announced that a "cyber incident" forced it to take...
A gang of hackers specialized in business email compromise (BEC) attacks and tracked as TA4903 has been impersonating various U.S....
Duvel Moortgat Brewery was hit by a ransomware attack late last night, bringing to a halt the beer production in...
Hackers are conducting widescale attacks on WordPress sites to inject scripts that force visitors' browsers to bruteforce passwords for other...