Webinar: Learn How to Comply with New Cyber Insurance Identity Security Requirements
Have you ever stopped to think about the potential consequences of a cyberattack on your organization? It's getting more intense…
Have you ever stopped to think about the potential consequences of a cyberattack on your organization? It's getting more intense…
Microsoft on Monday attributed a China-based cyber espionage actor to a set of attacks targeting diplomatic entities in South America.…
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different…
One thing is clear. The "business value" of data continues to grow, making it an organization's primary piece of intellectual…
Popular social news aggregation platform Reddit has disclosed that it was the victim of a security incident that enabled unidentified…
Malicious actors have published more than 451 unique Python packages on the official Python Package Index (PyPI) repository in an…
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation…
In a first-of-its-kind coordinated action, the U.K. and U.S. governments on Thursday levied sanctions against seven Russian nationals for their…
A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named…
Here are three of the worst breaches, attacker tactics and techniques of 2022, and the security controls that can provide…