How to Get One Step Ahead of Mobile Attacks
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging…
The advent of so-called "dropper" apps, which deliver and install malware that can also be later updated, is an emerging…
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of…
Microsoft has started rolling out its new endpoint security solution for small and medium-sized businesses (SMBs) known as Microsoft Defender for Business…
The big news this week is that the Conti ransomware gang has recruited the core developers and managers of the…
The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free…
Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey…
After four years of activity and numerous takedown attempts, the death knell of TrickBot has sounded as its top members…
The US Federal Bureau of Investigation (FBI) revealed that the BlackByte ransomware group has breached the networks of at least…
Microsoft is enabling an 'Attack Surface Reduction' security feature rule by default to block hackers' attempts to steal Windows credentials…
Microsoft has recently addressed a weakness in the Microsoft Defender Antivirus on Windows that allowed attackers to plant and execute malicious payloads…