This is a breaking news story and will be updated as new developments occur. This morning, Microsoft servers across the world displayed the dreaded "blue screen of death," leading to mass IT outages ...
One of China's more prolific threat groups, APT41, is carrying out a sustained cyber espionage campaign targeting organizations in multiple sectors, including global shipping and logistics, media and ...
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Threat actors just pulled off one of the largest data breaches of 2024, and they didn't even have to hack into the company's ...
The Cloud Security Alliance (CSA) has released the Certificate of Cloud Security Knowledge (CCSK) v5, the latest version of its vendor-neutral, cloud security training and certificate. Designed for ...
Iranian cyber-espionage group MuddyWater is pivoting from controlling infected systems with legitimate remote-management software to instead dropping a custom-made backdoor implant. As recently as ...
Disinformation — information created and shared to mislead opinion or understanding — isn't a new phenomenon. However, digital media and the proliferation of open source generative artificial ...
Akira ransomware actors are now capable of squirreling away data from victims in just over two hours, marking a significant shift in the average time it takes for a cybercriminal to move from initial ...
By breaking down fundamental assumptions, we can proactively plan for, and begin to achieve, future resilience.
Three novel attack techniques that chain together vulnerabilities found in numerous email-hosting platforms are allowing threat actors to spoof emails from more than 20 million domains of trusted ...
A fresh end-to-end phishing toolkit is making the rounds that significantly lowers the barrier to entry for cybercriminals to successfully mount and manage malicious email attacks that evade typical ...
While most people recognize that heading up a cybersecurity team requires a mix of both technical and so-called "soft skills," it's a reality that many security leaders struggle with the latter.