Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer
Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.
Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.
With ransomware attacks disrupting businesses and governments worldwide, we take a look at the latest finding in a recent ransomware…
SiegedSec threat group leaked data that Atlassian says was taken from app used to coordinate in-office resources.
Atlassian has confirmed that a breach at a third-party vendor caused a recent leak of company data and that their…
Atlassian has confirmed that a breach at a third-party vendor caused a recent leak of company data and that their…
Hackers are deploying a new malware named 'Frebniss' on Microsoft's Internet Information Services (IIS) that stealthily executes commands sent via…
Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc…
Russian national Vladislav Klyushin was found guilty of participating in a global scheme that involved hacking into U.S. computer networks…
The APT37 threat group (aka 'RedEyes' or 'ScarCruft') has been spotted using a new evasive malware named 'M2RAT' along with…
By Milica D. Djekic, Independent Researcher from Subotica, the Republic of Serbia. Abstract: Some criminology studies suggest crime can be…