Ranzy Locker ransomware hit tens of US companies in 2021
The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had […] The…
The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had […] The…
The Minimum Viable Secure Product is written as a checklist of minimum-security requirements for business-to-business software.
CISA and the NSA shared guidance on securing cloud-native 5G networks from attacks seeking to compromise information or deny access by taking…
Attackers could use a new macOS vulnerability discovered by Microsoft to bypass System Integrity Protection (SIP) and perform arbitrary operations,…
Six crucial steps executives and IT teams should be prepared to take immediately after a ransomware attack.
New Android malware can root infected devices to take complete control and silently tweak system settings, as well as evade detection using…
The acquisition strengthens HelpSystems’ data security portfolio with data loss prevention capabilities across the endpoint, network, and cloud.
Most IT and security leaders are confident their cybersecurity strategy is on the right track, but they still believe their…
Security researchers who analyzed 97 free EPUB reading applications found half are not compliant with security recommendations.
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May […] The…