Hackers use Conti’s leaked ransomware to attack Russian companies
A hacking group used the Conti's leaked ransomware source code to create their own ransomware to use in cyberattacks against…
A hacking group used the Conti's leaked ransomware source code to create their own ransomware to use in cyberattacks against…
Today, the U.S. has announced exemptions on previously imposed sanctions on Russia related to telecommunications and internet-based communications, likely to…
Microsoft has successfully disrupted attacks against Ukrainian targets coordinated by the Russian APT28 hacking group after taking down seven domains…
What is the best way to mitigate application security attacks? Learn how companies have mitigated the top threats.
A new TDS (Traffic Direction System) operation called Parrot has emerged in the wild, having already infected servers hosting 16,500…
Financing raised from Novator Ventures, Burda Principal Investments, General Catalyst, and leading angel investors.
Risk increases as the lines between physical and digital supply chains blur and the computing footprint expands.
Record-setting ransomware attacks, a shortage of skilled personnel, and low security awareness across the workforce cause headaches for IT security…
Fast Identity Online (FIDO) technology leverages security keys and biometrics to provide secure authentication.
A new information stealer named FFDroider has emerged, stealing credentials and cookies stored in browsers to hijack victims' social media…