News
The ransomware group combines IT vendor impersonation and phishing frameworks like Evilginx to breach its targets ...
Legal experts dissect how affected entities should respond to the DoJ's rule prohibiting data transactions with specific ...
A phishing campaign spoofing Booking.com has been observed targeting hospitality sector, using ClickFix to install malware ...
A new malware campaign targeting Windows and Linux systems has been identified, deploying tools for evasion and credential ...
Effective cybersecurity played a key role Ukraine drone attack on Russian strategic bombers, a leading government security ...
A new malware campaign using fake DocuSign verification pages to deploy the NetSupport Remote Access Trojan (RAT) has been ...
The new Cyber Security and Resilience (CS&R) Bill aims to address this challenge. Announced in the King’s Speech in July 2024 ...
The takedown, which occurred on May 27, was “closely related” to the broader Operation Endgame initiative launched in May ...
Two local information disclosure flaws in Linux crash-reporting tools have been identified exposing system data to attackers ...
A panel of CISOs at Infosecurity Europe urged their peers to use risk management and clear communication to tame a chaotic ...
More than half (56%) of all compromises in Q1 2025 resulted from the theft of valid account credentials with no multi-factor authentication (MFA) in place, according to new research by Rapid7, ...
Nearly half (46%) of organizations have experienced at least two cybersecurity incidents in their supply chain over the past year, according to new research by Risk Ledger presented at Infosecurity ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results