‘Midnight Blizzard’ Targets Networks With Signed RDP Files
The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering…
The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering…
by Dan K. Anderson CEO, CISO, and vCISO With the rise of software supply chain attacks, organizations are under increasing…
Russia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware and illegal circulation…
The SEC has charged four companies—Unisys Corp, Avaya Holdings, Check Point Software, and Mimecast—for allegedly misleading investors about the impact…
The "Code-on-Toast" supply chain cyberattacks by APT37 delivered data-stealing malware to users in South Korea who had enabled Toast pop-up…
Pagers and walkie-talkies can be turned into remotely triggered bombs — so why not electric vehicles? That was my first…
The ongoing prevalence (and rise) of software supply chain attacks is enough to keep any software developer or security analyst…
Nidec Corporation is informing that hackers behind a ransomware attack is suffered earlier this year stole data and leaked it…
1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse…
The International Longshoremen’s Association announced Thursday that it would suspend a strike after reaching a deal with the United States…