Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different…
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different…
One thing is clear. The "business value" of data continues to grow, making it an organization's primary piece of intellectual…
Popular social news aggregation platform Reddit has disclosed that it was the victim of a security incident that enabled unidentified…
Malicious actors have published more than 451 unique Python packages on the official Python Package Index (PyPI) repository in an…
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation…
In a first-of-its-kind coordinated action, the U.K. and U.S. governments on Thursday levied sanctions against seven Russian nationals for their…
A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named…
Here are three of the worst breaches, attacker tactics and techniques of 2022, and the security controls that can provide…
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in…
State-backed hackers from North Korea are conducting ransomware attacks against healthcare and critical infrastructure facilities to fund illicit activities, U.S.…