Iran’s APT34 Hits UAE With Supply Chain Attack
The prolific APT, also known as OilRig, was caught targeting an IT company's government clients in the region, with the…
The prolific APT, also known as OilRig, was caught targeting an IT company's government clients in the region, with the…
Due to the nature of the attack, Hot Topic says that it was unable to tell which accounts were accessed…
Innovations in continuous controls monitoring may be the only way underwriters can offer cyber-insurance policies that make sense in the…
Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding…
A culture of cybersecurity and implementing industry best practices can go a long way toward protecting a utility.
By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.
A lot of what the strategy proposes is well-intentioned but somewhat aspirational at the moment, industry experts say.
Experts warn that a new info-stealer named Statc Stealer is infecting Windows devices to steal a broad range of sensitive…
Worried about the spectacular array of adversaries and threat methodologies extant in today’s vast cyber landscape? The CISO playbook, when…
This week, we discuss data breaches affecting the Electoral Commission and the Police Service of Northern Ireland, and the financial…