Sextortion scam now use your “cheating” spouse’s name as a lure
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is…
June 24 marked the second anniversary of the Dobbs decision, which functionally abolished federal-level abortion protections protected by Roe v.…
Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to…
Adversaries reusing abandoned package names sneak malware into organizations in a sort of software shell game.
Threat actors are utilizing an attack called "Revival Hijack," where they register new PyPi projects using the names of previously…
Cisco's deal to acquire Robust Intelligence will make it possible to use red-team algorithms to assess risk in AI models…
It’s time to give your development process a boost. We’ve all been there staring at a security issue, trying to…
In the rapidly evolving world of cybersecurity, incidents frequently arise when malicious code finds its way into trusted environments. These…
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft…
Cyber-Informed Engineering (CIE) is a new perspective on OT cyber risk – one that is being embraced by OT/engineering teams and…