The Misconceptions of 2021’s Black Swan Cyber Events
Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and…
Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and…
A rapidly growing botnet is ensnaring routers, DVRs, and servers across the Internet to target more than 100 victims every…
Security researchers have published various proof of concepts (PoCs) scripts for exploiting CVE-2022-22954 on social media and other channels, essentially…
A joint cybersecurity advisory issued by CISA, NSA, FBI, and the Department of Energy (DOE) warns of government-backed hacking groups…
The attack involved use of a new version of Industroyer tool for manipulating industrial control systems.
The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal civilian agencies and urged all US organizations on Monday to patch an actively…
The Qbot botnet is now pushing malware payloads via phishing emails with password-protected ZIP archive attachments containing malicious MSI Windows…
CHARLOTTESVILLE, Va. , April 11, 2022 /PRNewswire/ — A clever new credential phishing attack known...
The Mirai malware is now leveraging the Spring4Shell exploit to infect vulnerable web servers and recruit them for DDoS (distributed denial…
By Professor Ronghui Gu, Co-Founder, CertiK Blockchain is, at heart, a security technology. Distributed Ledger Technology (DLT) is […] The…