Enterprises Are Sailing Into a Perfect Storm of Cloud Risk
Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud…
Policy as code and other techniques can help enterprises steer clear of the dangers that have befallen otherwise sophisticated cloud…
Security analysts have discovered and linked MoonBounce, "the most advanced" UEFI firmware implant found so far in the wild, to the Chinese-speaking APT41…
Cross-site scripting and broken access controls continued to be the top classes of vulnerabilities researchers discovered, according to Bugcrowd's annual…
By Lee Pitman, Global Head of Response Services, BreachQuest As we close out 2021, the biggest trend in […] The…
The maintainers of a "disposable email service" blocklist have decided to add Firefox Relay to the list, leaving many users…
Microsoft is warning of destructive data-wiping malware disguised as ransomware being used in attacks against multiple organizations in Ukraine. [...]
US Cyber Command (USCYBERCOM) has officially linked the Iran-linked MuddyWater APT group to Iran’s Ministry of Intelligence and […] The…
Eight members of the REvil ransomware operation that have been detained by Russian officers are currently facing criminal charges for…
Flash loans, a type of uncollateralized lending, have gained in popularity, as well as bad press. Flash loan […] The…
At least 15 websites belonging to various Ukrainian public institutions were compromised, defaced, and subsequently taken offline. [...]