Expiring Root Certificates Threaten IoT in the Enterprise
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.
What happens when businesses' smart devices break? CSOs have things to fix beyond security holes.
The Chinese Winnti hacking group, also known as 'APT41' or 'Wicked Spider,' targeted at least 80 organizations last year and…
Heads of CIA and CISA headline event at DC Convention Center.
Argentina's Judiciary of Córdoba has shut down its IT systems after suffering a ransomware attack, reportedly at the hands of…
By Carolyn Crandall, Chief Security Advocate, Attivo Networks Sometimes, organizations change from within, while other times change is […] The…
It was a very busy week for ransomware news and attacks, especially with the disclosure that Cisco was breached by…
Microsoft has pulled the Microsoft 365 version 2206 update after users report their Office applications are crashing when viewing a…
Threat actors can abuse weaknesses in HTTP request handling to launch damaging browser-based attacks on website users, researcher says.
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried…
Cisco has addressed a high severity vulnerability affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. [...]