Tech Giants Launch Post-Quantum Cryptography Coalition
A new tech consortium launched today with a mission to drive adoption of post-quantum cryptography (PQC).The PQC Coalition features Microsoft,...
A new tech consortium launched today with a mission to drive adoption of post-quantum cryptography (PQC).The PQC Coalition features Microsoft,...
Pension providers reported a staggering quadruple-digit percentage increase in data breaches to the UK regulator last year, according to new...
The US Cybersecurity and Infrastructure Security Agency (CISA) has published new guidance designed to improve the accuracy of risk assessments...
Fear, ignorance and forgetfulness are some of the reasons for widespread shortcomings in reporting cyber-attacks and breaches, both internally and...
Xenomorph malware has reemerged in a new distribution campaign, expanding its scope to target over 30 US banks along with...
A new malware strain called ZenRAT has emerged, concealed within counterfeit Bitwarden installation packages.Discovered by Proofpoint, ZenRAT is a modular...
A recent collaborative investigation by Group-IB Threat Intelligence, Bridewell and threat researcher Michael Koczwara has exposed the existence of a new...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Mixin Network, an open-source, peer-to-peer transactional network for digital assets, has announced today on Twitter that deposits and withdrawals are...
Google is notifying Gmail users that the webmail's Basic HTML view will be deprecated in January 2024, and users will...
The Better Outcomes Registry & Network (BORN), a healthcare organization funded by the government of Ontario, has announced that it is...
Security researchers discovered a new campaign that distributes a new version of the Xenomorph malware to Android users in the...
A Nigerian extradited to the US had pleaded guilty to his part in a multimillion-dollar business email compromise (BEC) conspiracy.Kosi...
Security researchers have revealed a sophisticated new modular backdoor which they believe is the work of the United Arab Emirates’...
The MOVEit saga continues to claim more victims, after an education non-profit revealed that 890 US schools signed up with it...
A prolonged and ongoing cyber-espionage campaign by the threat actor known as EvilBamboo (formerly Evil Eye) has been uncovered by...
Hong Kong-based decentralized finance (DeFi) project Mixin Network lost around $200m in cryptocurrency in what could already be one of...
Unit 42 researchers have unveiled a web of complex cyber-espionage attacks targeting a government in Southeast Asia. While initially thought...
In anticipation of the upcoming 2024 election, major US voting equipment manufacturers have announced an initiative to collaborate with cybersecurity...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them? 83%...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the...
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a threat actor codenamed...
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based...