New Survey Uncovers How Companies Are Confronting Data Security Challenges Head-On
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches, new ways to…
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches, new ways to…
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage. "This channel…
A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously undocumented…
Google on Wednesday rolled out fixes to address a new actively exploited zero-day in the Chrome browser. Tracked as CVE-2023-5217,…
Government and telecom entities have been subjected to a new wave of attacks by a China-linked threat actor tracked as…
A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous deployment (CI/CD) software could be exploited by unauthenticated…
A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government organizations. Recorded Future's…
How To Use This Report Enhance situational awareness of techniques used by threat actors Identify potential attacks targeting your industry…
An updated version of an Android banking trojan called Xenomorph has set its sights on more than 35 financial institutions…
SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can…