‘The Mask’ Espionage Group Resurfaces After 10-Year Hiatus
Researchers recently spotted the Spanish-speaking threat actor — with nearly 400 previous victims under its belt — in a new…
Researchers recently spotted the Spanish-speaking threat actor — with nearly 400 previous victims under its belt — in a new…
By Dwayne McDaniel, GitGuardian Developer and Security Advocate, GitGuardian The modern world of DevOps means relying on our code connecting…
The financially motivated threat actor FIN7 targeted a large U.S. car maker with spear-phishing emails for employees in the IT…
By Milica D. Djekic The mechatronics systems are a common part of the industrial control systems (ICS) or – in…
In 2016, Amazon touted the miraculous automation technology of its grocery stores that allowed people to "Just Walk Out," but…
Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply…
By Chahak Mittal, GRC Manager, Universal Logistics In the ever-changing world of technology, managing end-of-life (EOL) and out-of-service (OOS) operating…
NVD may be in peril, and while alternatives exist, enterprise security managers will need to plan accordingly to stay on…
Kimsuky-attributed campaign uses eight steps to compromise systems — from initial execution to downloading additional code from Dropbox, and executing…
Whoopsies in Ireland and Scotland speak to a tenuousness of cyber protections for sensitive private healthcare data.