Cyberattackers Spoof Palo Alto VPNs to Spread WikiLoader Variant
The malware, first discovered two years ago, has returned in campaigns using SEO poisoning.
The malware, first discovered two years ago, has returned in campaigns using SEO poisoning.
Fraud prevention today is like a game of whack-a-mole. When one fraudster or attack method is stamped out, another arises…
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.
North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…
Since surfacing in February 2024, RansomHub ransomware affiliates have breached over 200 victims from a wide range of critical U.S.…
As APIs become the backbone of digital transformation, they also represent one of the biggest security risks to organizations. According…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a…
At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking…