News

Across industries, organizations are facing increasing pressure to protect their rapidly expanding digital ecosystems. The rising popularity of hybrid cloud environments and remote work have increased ...
Layoffs across industries and federal agencies have impacted millions of workers this year alone. But these mass reductions also pose challenges to organizations' overall cybersecurity posture. "Be ...
A new type of wiper malware was used in a destructive cyberattack on a critical infrastructure organization in Ukraine. According to a report Thursday from Cisco Talos, the previously unknown malware, ...
Israel-based Cellebrite offered $170 million in cash today for Tyson's Corner, Va.-based Corellium, with $20 million converted to equity upon closing, which is expected this summer. Cellebrite is a ...
As artificial intelligence (AI) continues to reshape industries, economies, and societies at unprecedented speed, the urgency to establish clear, effective regulations has never been greater. In the ...
An Iranian cyber-espionage group hid in a target's network for nearly a decade before being detected. ESET published research today concerning "BladedFeline," an Iranian advanced persistent threat ...
I often say that cybersecurity professionals today are not drowning, they're suffocating. Research I recently undertook with colleagues at OX Security revealed that an average organization has more ...
The Emergency Management and Response – Information Sharing and Analysis Center (EMR-ISAC) is the latest entity to take a hit amid budget cuts and the reorganization of the federal bureaucracy. Last ...
Device codes are alphanumeric or numeric codes employed for authenticating an account on a device that does not have a standard login interface, such as a browser or input-limited devices, where it is ...
A phishing group named "Haozi" is selling turnkey phishing infrastructure to amateur attackers — no commands needed. Security vendor Netcraft today published research concerning the Chinese-language ...
A new mobile malware tool that security vendors are tracking as "Crocodilus" is stealthily slithering onto Android devices around the world via fake banking apps, phony browser updates, and malicious ...
Despite the recent international operation that took down the info-stealing malware known as LummaC2 (aka Lumma Stealer), the malware continues to operate in some capacity. However, a new stealer ...