Understand how NIS2 requirements will affect those mandated industries, and what security providers can do to help them ...
Strela Stealer remains Hive0145’s primary tool, focused on email credentials and configured to run on devices with specific ...
Lazarus APT has been found smuggling malware onto macOS devices using custom extended attributes, evading detection ...
Researchers at Google Cloud believe the AI threat will worsen in 2025 despite not having had the catastrophic impact some ...
An individual who posted data allegedly stolen via MOVEit from Amazon and other big-name firms claims not to be malicious ...
By adopting a transformational leadership approach, CISOs can take proactive steps to protect their organization (and ...
It’s been another busy Patch Tuesday for system administrators, with Microsoft releasing updates for nearly 100 ...
A complex phishing campaign attributed to the Iranian-linked threat actor TA455, has been observed using sophisticated ...
New phishing tool GoIssue targets GitHub, enabling mass phishing, and has been linked to the GitLoker extortion campaign ...
Panaseer claims 72% of security leaders are taking out personal indemnity insurance as board scrutiny increases ...
Microsoft Visio, often used for flowcharts and network diagrams, has now become a tool of deception in phishing campaigns.
Towr has found a flaw in Citrix’s Session Recording Manager that can be exploited to enable unauthenticated RCE against ...