How to Think Like a Hacker and Stay Ahead of Threats
To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with…
To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three flaws to its Known Exploited Vulnerabilities (KEV) catalog,…
A Russia-linked threat actor has been observed deploying a new information-stealing malware in cyber attacks targeting Ukraine. Dubbed Graphiron by…
Suspected Russian threat actors have been targeting Eastern European users in the crypto industry with fake job opportunities as bait…
A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of community service for…
After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs ransomware…
Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System (DMS) offerings from four vendors…
A previously unknown threat actor has been targeting companies in the U.S. and Germany with bespoke malware designed to steal…
The U.S. National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms…
The advanced persistent threat (APT) actor known as Tonto Team carried out an unsuccessful attack on cybersecurity company Group-IB in…