5 Cloud Native Security Platform Must-haves
Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend...
Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend...
In this final part, we discuss the countries most affected by SMS PVA services as well as lay out several...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees. Researchers from cybersecurity firm Proofpoint uncovered...
On March 1, US President Joe Biden gave his first State of the Union Address (SOTU) speech to Congress. In...
Chipmaker giant Nvidia confirmed a data breach after the recently disclosed security incident, proprietary information stolen. The chipmaker giant Nvidia...
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues. The popular collective Anonymous, and...
The Chrome team announced the promotion of Chrome 99 to the stable channel for Windows, Mac and Linux on March...
I have long said that Deepfakes missed the boat on being stealthy, believable pieces of footage able to turn the...
Meta says it has detected and removed two disinformation campaigns regarding the current Russia-Ukraine war. These campaigns, it says, were...
Toyota suspended the operation of 28 lines at 14 plants in Japan on Tuesday, March 1, after a cyberattack on...
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels. Recently a Ukrainian researcher leaked...
Executive summary On February 24, 2022, Avast Threat Research published a tweet announcing the discovery of new Golang ransomware, which...
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine. ESET researchers...
On February 27, an individual associated with the Conti ransomware group started leaking a treasure trove of data beginning with...
Daxin is the most advanced backdoor in the arsenal of China-linked threat actors designed to avoid the detection of sophisticated...
Data breaches are one of the most reported cyberattacks against businesses—regardless of size and industry. And while this has highlighted...
US CISA and the FBI warned US organizations that data wiping attacks targeting Ukraine entities could spill over to targets...
We’ve received an interesting spam email which (deliberately or not) could get people thinking about the current international crisis. Being...
Microsoft revealed that Ukrainian entities were targeted with a previous undetected malware, dubbed FoxBlade, several hours before the invasion. The...
Explore how secure infrastructure-as-code (IaC) enables security leaders to help DevOps teams quickly deliver more business value. If you like...
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications...
Anonymous and other hacker groups that responded to the call to war against Russia continue to launch cyberattacks on gov...
The UK’s data watchdog has issued a reprimand to both the Scottish government and NHS National Services Scotland about their...