Smart Meter Security: Best Practices and Emerging Regulations
Smart meters are essential to smart grids, empowering utilities and smart grid managers to provide consumers and energy providers with…
Smart meters are essential to smart grids, empowering utilities and smart grid managers to provide consumers and energy providers with…
EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities…
The dark web leak site of the Everest ransomware gang has apparently been hacked over the weekend by an unknown attacker and is…
Over the weekend, a massive wave of credential stuffing attacks hit multiple large Australian super funds, compromising thousands of members'…
A hacker breached the GitLab repositories of multinational car-rental company Europcar Mobility Group and stole source code for Android and…
The Hunters International Ransomware-as-a-Service (RaaS) operation is shutting down and rebranding with plans to switch to date theft and extortion-only…
A China-linked cyberespionage group known as 'FamousSparrow' was observed using a new modular version of its signature backdoor 'SparrowDoor' against a US-based…
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those…
Selecting the right Laptop For Cybersecurity is one of the most critical decisions for cybersecurity professionals. Whether you are a CISO, penetration…
A new cybercrime platform named 'Atlantis AIO' provides an automated credential stuffing service against 140 online platforms, including email services,…