Newly ID’ed Chinese APT Hides Backdoor in Software Updates
The threat actor went more than half a decade before being discovered — thanks to a remarkable backdoor delivered in…
The threat actor went more than half a decade before being discovered — thanks to a remarkable backdoor delivered in…
Refined tactics, increased collaboration between groups, and continued success exploiting zero-days is helping ICS ransomware attackers inflict more damage, researchers…
The integration of different disciplines of cybersecurity and fraud management is a necessary evolution in the face of increasingly sophisticated…
Saudi rail provider partners will help Saudi Telecommunication Company (stc) to keep its security on track.
It's unclear if the attacks — which hit oil and gas, postal service, transport safety, and railway organizations in the…
Threat actors created and abused OAuth apps to access Microsoft's corporate email environment and remain there for weeks.
Cathay, a travel lifestyle brand that includes the Cathay Pacific airline, had a growing cybersecurity problem made worse by its…
An investigation into 2021 intrusions uncovered multiple infections on the phones of journalists in the African country.
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.
Hacking teams pick apart electrical vehicles (EVs), exposing them for what they are: safety-critical computers without commensurate security.