News
A vulnerability found in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments ...
The Emergency Management and Response – Information Sharing and Analysis Center (EMR-ISAC) is the latest entity to take a hit amid budget cuts and the reorganization of the federal bureaucracy. Last ...
As synthetic audio continues to improve, it's also getting harder for anti-spoofing models to accurately detect. That's according to recent research published on June 1 by a team of researchers at ...
A new type of wiper malware was used in a destructive cyberattack on a critical infrastructure organization in Ukraine. According to a report Thursday from Cisco Talos, the previously unknown malware, ...
A phishing group named "Haozi" is selling turnkey phishing infrastructure to amateur attackers — no commands needed. Security vendor Netcraft today published research concerning the Chinese-language ...
When the BlackTech cyber-espionage group planted malware in a firm providing telecommunications services for the 2022 FIFA World Cup, the China-linked threat group was largely unknown. Soon, it had ...
Across industries, organizations are facing increasing pressure to protect their rapidly expanding digital ecosystems. The rising popularity of hybrid cloud environments and remote work have increased ...
Tenable Security has announced plans to acquire Apex, an Israel-based startup specializing in security solutions driven by artificial intelligence (AI). Apex will be integrated into Tenable One, ...
A new mobile malware tool that security vendors are tracking as "Crocodilus" is stealthily slithering onto Android devices around the world via fake banking apps, phony browser updates, and malicious ...
I often say that cybersecurity professionals today are not drowning, they're suffocating. Research I recently undertook with colleagues at OX Security revealed that an average organization has more ...
A China-nexus threat actor behind the recent exploitation of SAP's NetWeaver software is expanding its campaign, taking advantage of unpatched, Internet-exposed servers deployed by organizations ...
Despite the recent international operation that took down the info-stealing malware known as LummaC2 (aka Lumma Stealer), the malware continues to operate in some capacity. However, a new stealer ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results