After a Busy December, Attacks on Log4j Vulnerability Dropped
While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable…
While attackers and researchers shift their attention to the next new vulnerability, security teams make sure they finish patching vulnerable…
The Lapsus$ data extortion group leaked today a huge collection of confidential data they claim to be from Samsung Electronics,…
Nearly 65% of security operations center (SOC) analysts are likely to change jobs in the next year, survey shows.
Researchers say passwords with less than seven characters can be hacked "instantly."
Ordr Clinical Defender, running on the new Ordr 8 Software release, provides focused, actionable, and accurate HTM insights and workflows.
Report examines the prevalence of two common insecure practices.
By Tim Sadler, Co-founder and CEO, Tessian The massive labor upheaval that dominated headlines in 2021 shows no […] The…
By Amanda Surovec, Director of Security Engagement and Claims, Resilience Cyber Insurance Solutions, and Shawn Melito, Chief Revenue […] The…
Ukraine's Computer Emergency Response Team calls out UNIC1151 nation-state hacking group out of Belarus as behind the attacks.
An infostealing piece of malware called Jester Stealer has been gaining popularity in the underground cybercrime community for its functionality…