Joining a growing group of cybersecurity-related "maturity models," PKIMM allows companies to measure their progress and benchmark themselves against other…
Multiple zero-day vulnerabilities named 'BitForge' in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell 17 affected…
Kroll Employee SIM-Swapped for Crypto Investor Data
Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of…
Publisher’s Spotlight: Cigent: Make Your Data Invisible
Cigent Technologies is a data security company that is renowned for their data protection capabilities. They’ve had a long-standing relationship…
Kroll data breach exposes info of FTX, BlockFi, Genesis creditors
Multiple reports on social media warn of a data breach at financial and risk advisory company Kroll that resulted in…
NIST Publishes First Draft Standards for Post-Quantum Cryptography
Publication of the first draft PQC standards opens a 90-day period for public comment and paves the way for interoperability…
Threat Actor Exploits Zero-Day in WinRAR to Target Crypto Accounts
Attacks targeting the now-patched bug have been going on since at least April 2023, security vendor says.
PKI Maturity Model Aims to Improve Crypto Infrastructure
Joining a growing group of cybersecurity-related "maturity models," PKIMM allows companies to measure their progress and benchmark themselves against other…
Threat actors use beta apps to bypass mobile app store security
The FBI is warning of a new tactic used by cybercriminals where they promote malicious "beta" versions of cryptocurrency investment…
FBI warns of increasing cryptocurrency recovery scams
The FBI is warning of an increase in scammers pretending to be recovery companies that can help victims of cryptocurrency…
What Will Cybersecurity Jobs Look Like in 2028?
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic…
New BitForge cryptocurrency wallet flaws lets hackers steal crypto
Multiple zero-day vulnerabilities named 'BitForge' in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell 17 affected…