Acer confirms Philippines employee data leaked on hacking forum
Acer Philippines confirmed that employee data was stolen in an attack on a third-party vendor who manages the company's employee…
Acer Philippines confirmed that employee data was stolen in an attack on a third-party vendor who manages the company's employee…
Tuta Mail has announced TutaCrypt, a new post-quantum encryption protocol to secure communications from powerful and anticipated decryption attacks. [...]
Open-source software ecosystem compromise leaves developers in Asia and around the globe at risk.
The NSA and the Cybersecurity and Infrastructure Security Agency (CISA) have released five joint cybersecurity bulletins containing on best practices…
The National Security Agency is sharing new guidance to help organizations limit an adversary's movement on the internal network by…
A new malware dubbed 'WogRAT' targets both Windows and Linux in attacks abusing an online notepad platform named 'aNotepad' as…
Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large…
By John Riley III, Cyber Business Development, Alan B. Levan | NSU Broward Center of Innovation Generative AI: The Future…
Dark Reading's roundup of strategic cyber-operations insights for chief information security officers and security leaders. Also this week: SEC enforcement…
By Ron Konezny, President & CEO, Digi International The most cybersecurity-savvy members of an organization are typically not the key…