The Cyberwar Between the East and the West Goes Through Africa
By working cooperatively, the West and Africa can mobilize to tackle nation-state-backed cyber threats.
By working cooperatively, the West and Africa can mobilize to tackle nation-state-backed cyber threats.
Evasive malware disguised as a caching plug-in allows attackers to create an admin account on a WordPress site, then take…
Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative…
Joe Sullivan's lawyers have claimed his conviction on two felony charges is based on tenuous theories and criminalizes the use…
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.
Companies with customers in California need to prepare for a new process for demanding deletion of personal data.
A sophisticated APT known as "ToddyCat," sponsored by Beijing, is cleverly using unsophisticated malware to keep defenders off their trail.
Touted for days as potentially catastrophic, the curl flaws only impact a narrow set of deployments.
Organizations should brace for mass exploitation of CVE-2023-22515, an uber-critical security bug that opens the door to crippling supply chain…
Cisco's $28 billion purchase of Splunk was the biggest story, but there were other big security acquisitions and investments during…