Early Discovery of Pipedream Malware a Success Story for Industrial Security
Cybersecurity professionals discovered, analyzed, and created defenses against the ICS malware framework before it was deployed, but expect the stakes…
Cybersecurity professionals discovered, analyzed, and created defenses against the ICS malware framework before it was deployed, but expect the stakes…
Threat analysts report that zero-day vulnerability exploitation is on the rise with Chinese hackers using most of them in attacks…
Ransomware and other financially motivated threat actors joined nation-state-backed groups in leveraging unpatched flaws in attack campaigns, new data shows.
Pwn2Own Miami 2022 has ended with competitors earning $400,000 for 26 zero-day exploits (and several bug collisions) targeting ICS and…
A Hive ransomware affiliate has been targeting Microsoft Exchange servers vulnerable to ProxyShell security issues to deploy various backdoors, including Cobalt Strike…
Mandiant data also shows a dramatic drop in attacker dwell time on victim networks in the Asia-Pacific region — to…
Digital threat researchers at Citizen Lab have discovered a new zero-click iMessage exploit used to install NSO Group spyware on…
Amid the growing threat of malware, enterprises and employees alike must take responsibility for the dangers of living […] The…
The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure.
Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and…