A CISO’s Guide to Avoiding Jail After a Breach
Yahoo, Uber, SolarWinds — increasingly, the government is incentivizing better corporate security by punishing the individuals leading it. Is that…
Yahoo, Uber, SolarWinds — increasingly, the government is incentivizing better corporate security by punishing the individuals leading it. Is that…
Hackers are targeting older versions of the HTTP File Server (HFS) from Rejetto to drop malware and cryptocurrency mining software. [...]
Healthcare fintech firm HealthEquity is warning that it suffered a data breach after a partner's account was compromised and used…
How Sober in Cyber is redefining professional connections in the security industry.
Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy…
Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain…
Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and…
Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches.…
Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to authentication bypass in Session Smart…
Hackers are exploiting a critical vulnerability that affects all D-Link DIR-859 WiFi routers to collect account information from the device,…