X
No Ads. No Trackers. No Kidding! (Learn More)
Loading...
Thumbnail
The January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader. [Read More]
Thumbnail
Apply these 9 tips to proactively fight fraudulent websites that steal customers' trust, money, and personally identifiable information. [Read More]
Thumbnail
The greatly expanding attack surface created by the cloud needs to be protected. [Read More]
Thumbnail
Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber-resiliency capabilities. [Read More]
Thumbnail
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group. [Read More]
Thumbnail
Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve. [Read More]
Thumbnail
The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and... [Read More]
Analysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection. [Read More]
Thumbnail
At least 1,200 Redis servers worldwide have been infected with "HeadCrab" cryptominers since 2021. [Read More]
Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says. [Read More]
An OpSec slip from the North Korean threat group helps researchers attribute what was first suspected as a ransomware attack to nation-state espionage. [Read More]
Enterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers' trust, money, and personally identifiable information. [Read More]
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an... [Read More]
Noting 13% year-over-year growth in fraudulent instruction as a cause of loss, report predicts organizations must get smarter about educating employees to spot fraudulent tactics. [Read More]
Killnet is building its profile, inspiring jewelry sales and rap anthems. But the impact of its DDoS attacks, like the ones that targeted 14 major... [Read More]
Gem Security provides the world's first holistic approach for Cloud TDIR, bridging the gap between cloud complexity and security operations. [Read More]
one particularly gnarly - could allow hackers the freedom to do as they wish with the popular edge equipment. [Read More]
The Security Innovation Alliance (SIA) empowers customers to create holistic security programs by leveraging robust end-to-end integration partnerships. [Read More]
Findings underscore security awareness training that leverages practical, hands-on exercises is essential to creating a security-aware culture. [Read More]
Google Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were exposed in T-Mobile hack. [Read More]
Loading...
Save As
Preview
Preview