Google: State hackers still exploiting Internet Explorer zero-days
Google's Threat Analysis Group (TAG) revealed today that a group of North Korean hackers tracked as APT37 exploited a previously unknown…
Google's Threat Analysis Group (TAG) revealed today that a group of North Korean hackers tracked as APT37 exploited a previously unknown…
Microsoft has warned of Russian-sponsored cyberattacks continuing to target Ukrainian infrastructure and NATO allies in Europe throughout the winter. [...]
A top Navy SEAL official is going against the Biden administration's military vaccine mandate by recommending that one SEAL be…
A financially motivated threat actor is hacking telecommunication service providers and business process outsourcing firms, actively reversing defensive mitigations applied…
By Milica D. Djekic Independent researcher, Subotica, The Republic of Serbia Abstract Engineering challenges have appeared throughout time […] The…
By Patti Key, Chief Revenue Officer (CRO), TPx Security remains among companies’ top challenges, permeating nearly every business […] The…
Open source software hosting provider Fosshost will no longer be providing services as it reaches end of life. Fosshost project volunteers…
The Department of Homeland Security (DHS) Cyber Safety Review Board will review attacks linked to an extortion group known as Lapsus$, which breached…
A previously undocumented data wiper named CryWiper is masquerading as ransomware, extorting victims to pay for a decrypter, but in…
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.