security.didici.cc

Secure email group Proton wins Swiss appeal over surveillance rules

39 minutes ago

Ruling says email services not subject to data retention rules.

Ransomware Rise Pushes Organizations to Prepare for Attack

1 day ago

Ransomware attacks continue to grow in number and severity, data shows, but organizations are stepping up to prepare for the threat.

aDolus raises $2.5 million to secure critical infrastructure and grow sales and marketing team

2 days ago

Software supply chain security experts to drive aggressive go-to-market strategy

FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks

2 days ago

The infamous Carbanak operator is moving is looking to juice its ransomware game by recruiting IT staff to its fake Bastion Secure 'pen-testing' company.

'TodayZoo' Phishing Kit Cobbled Together From Other Malware

2 days ago

Microsoft's analysis of a recent phishing attack shows how cybercriminals are mixing and matching to efficiently develop their attack frameworks.

Better late than never: Microsoft rolls out a public preview of E2EE in Teams calls

2 days ago

Only for one-to-one voice and video, mind Microsoft has finally kicked off the rollout of end-to-end-encryption (E2EE) in its Teams collaboration platform with a public preview of E2EE for one-to-one calls.…

REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say

2 days ago

A multi-country effort has given ransomware gang REvil a taste of its own medicine by pwning its backups and pushing its leak site and Tor payment site offline.

7 Ways to Lock Down Enterprise Printers

2 days ago

Following the PrintNightmare case, printer security has become a hot issue for security teams. Here are seven ways to keep printers secure on enterprise networks.

What Does Better Insider Risk Management Look Like?

2 days ago

Conventional data security tools do not address insider risk — a growing problem in today's remote-hybrid world. We need a better way to manage insider risk.

Recycled Cobalt Strike key pairs show many crooks are using same cloned installation

2 days ago

Researcher spots RSA tell-tale lurking in plain sight on VirusTotal Around 1,500 Cobalt Strike beacons uploaded to VirusTotal were reusing the same RSA keys from a cracked version of the software, according to a security researcher who pored through the m ...

Cisco SD-WAN Security Bug Allows Root Code Execution

2 days ago

The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw.

What Squid Game Teaches Us About Cybersecurity

2 days ago

When life inside the security operations center feels treacherous, here are some suggestions for getting out alive.

Threat Actors Abuse Discord to Push Malware

2 days ago

The platform’s Content Delivery Network and core features are being used to send malicious files—including RATs--across its network of 150 million users, putting corporate workplaces at risk.

Unhappy customers and their own tricks used against them, REvil ransomware gang reportedly pulled offline by 'multi-country' operations

2 days ago

The second vanishing of the cybergang... for now As we noted a few days back, notorious ransomware gang REvil "disappeared" again this week. Recent reports have now shed light on why that may be.…

How your phone, laptop, or watch can be tracked by their Bluetooth transmissions

2 days ago

Unique fingerprints lurk in radio signals more often than not, it seems Over the past few years, mobile devices have become increasingly chatty over the Bluetooth Low Energy (BLE) protocol and this turns out to be a somewhat significant privacy risk.…

YouTubers fell for shady 'sponsors' who seized, then sold, accounts

2 days ago

Vid-slingers had been asking how this happened for years, even while their channels were spruiking dodgy crypto After years of complaints from YouTubers, Google has pinpointed the root cause of a series of account hijackings: software sponsorship deals th ...

Ransomware gang REvil forced offline in multi-country operation

2 days ago

Coordinated takedown by US gov, allies.

Google Buckles Down on Android Enterprise Security

2 days ago

The launch of Android 12 brings several new default security features, along with new security efforts for Android Enterprise.

Malware Abuses Core Features of Discord

3 days ago

Researchers warn that Discord's bot framework can be easily weaponized.

Cybrary Launches New Partnership with Check Point Software to Make Cybersecurity Training Accessible to All

3 days ago

Online cybersecurity professional development platform bolsters the Check Point Education Initiative.

Security Teams Still Favor Prevention Over Detection

3 days ago

Security leaders are adopting a multilayered approach to address new security threats and risks.

Akamai Technologies Completes Acquisition of Guardicore to Extend Its Zero Trust Solutions to Help Stop Ransomware

3 days ago

Guardicore's micro-segmentation products will be added to Akamai's portfolio of Zero Trust solutions.

Plurilock to Acquire Assets of CloudCodes Software

3 days ago

Transaction marks Plurilock’s second acquisition in 2021.

Invicti Security Announces $625 Million Growth Investment Led by Summit Partners

3 days ago

Web application security provider plans to leverage new investment to continue product expansion and support global growth.

Nearly Three-Quarters of Organizations Victimized by DNS Attacks in Past 12 Months

3 days ago

Response and recovery have significant impact on 58% of targeted businesses.

Cohesity Announces Disaster Recovery as a Service, Providing Automated Disaster Recovery

3 days ago

New Offering Can Help Businesses Quickly Recover from Ransomware Attacks, Speed Data Recovery, and Advance Business Continuity

Cohesity Announces Disaster Recovery as a Service, Providing Automated Disaster Recovery

3 days ago

New Offering Can Help Businesses Quickly Recover from Ransomware Attacks, Speed Data Recovery, and Advance Business Continuity

Why Should My Organization Consider XDR?

3 days ago

XDR is a newish industry term addressing a very old problem: security products that don't work together to detect threats.

U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn

3 days ago

Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.

TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

3 days ago

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.

Microsoft Launches Security Program for Nonprofits

3 days ago

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.

Gigabyte Allegedly Hit by AvosLocker Ransomware

3 days ago

If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.

Macs Still Targeted Mostly With Adware, Less With Malware

3 days ago

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.

We regret to inform you there's an RCE vuln in old version of WinRAR. Yes, the file decompression utility

3 days ago

Update to v6.02 – or don't, but on your head be it A remote code execution vulnerability existed in an old and free trial version of WinRAR, according to infosec firm Positive Technologies.…

How Psychology Can Save Your Cybersecurity Awareness Training Program

3 days ago

Understanding human psychology, how it works, and how to introduce its concepts into cybersecurity awareness training can make a huge difference to your organization.

Why is Cybersecurity Failing Against Ransomware?

3 days ago

Hardly a week goes by without another major company falling victim to a ransomware attack. Nate Warfield, CTO at Prevailion, discusses the immense challenges in changing that status quo.

Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween

3 days ago

Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems and disrupted production.

Research finds consumer-grade IoT devices showing up... on corporate networks

3 days ago

Considering the slack security of such kit, it's a perfect storm Increasing numbers of "non-business" Internet of Things devices are showing up inside corporate networks, Palo Alto Networks has warned, saying that smart lightbulbs and internet-connected p ...

What is self-learning AI and how does It tackle ransomware?

3 days ago

Darktrace: why you need defence that operates at machine speed Sponsored  There used to be two certainties in life - death and taxes - but thanks to online crooks around the world, there's a third: ransomware. This attack mechanism continues to gain trac ...

Uncle Sam to clip wings of Pegasus-like spyware – sorry, 'intrusion software' – with proposed export controls

3 days ago

Surveillance tech faces trade limits as America syncs policy with treaty obligations More than six years after proposing export restrictions on "intrusion software," the US Commerce Department's Bureau of Industry and Security (BIS) has formulated a rule ...

Proposed HTTPA Protocol Uses TEEs to Secure the Web

3 days ago

Intel researchers describe how Trusted Execution Environments can enhance HTTPS and boost web security.

Optiv Announces Second Annual $40,000 Scholarship for Black, African American Identifying STEM Students

3 days ago

$10,000 to be awarded annually for four years each by Optiv’s Black Employee Network.

Microsoft-Signed Rootkit Targets Gaming Environments in China

4 days ago

FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.

Microsoft, Intel, and Goldman Sachs to Lead New TCG Work Group to Tackle Supply Chain Security Challenges

4 days ago

Led by representatives from the three companies, the work group will create guidance that defines, implements, and upholds security standards for the entire supply chain.

MITRE Engenuity Announces ATT&CK® Evaluations Call for Participation for Managed Services

4 days ago

Offering to provide transparency into the capabilities of managed security service providers and and managed detection and response competencies.

CISA Awards $2 Million to Bring Cybersecurity Training to Rural Communities and Diverse Populations

4 days ago

Award recipients NPower and CyberWarrior recognized for development of cyber workforce training programs.

Execs From Now-Defunct GigaTrust Arrested in $50M Fraud Scheme

4 days ago

Email endpoint security-as-a-service company founder and two others indicted in an elaborate financial fraud scheme.

Google: Phishing Campaign Targets YouTube Creators

4 days ago

The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.

Removing Friction for the Enterprise With Trusted Access

4 days ago

Trusted access can help reduce friction so that your team can get work done.

Google Crushes YouTube Cookie-Stealing Channel Hijackers

4 days ago

Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels. 

We don’t want to be critical, but humans alone aren’t enough to protect your ICS

4 days ago

If you want to know the solution, join this Regcast Sponsored  We know for sure that ransomware attackers and sundry dark forces want to break into critical infrastructure. Ransomware attacks on industrial environments have increased by 500 per cent sinc ...

VPN Exposes Data for 1M Users, Leading to Researcher Questioning

4 days ago

Experts warn that virtual private networks are increasingly vulnerable to leaks and attack.

Passwordless Is the Future … but What About the Present?

4 days ago

Password managers, single sign-on, and multifactor authentication each offers its own methodology and unique set of benefits — and drawbacks — to users.

The Ransomware Payment Dilemma: Should Victims Pay or Not?

4 days ago

It's time to steer the conversation away from whether payment bans should be implemented to how and when they should take effect.

JavaScript Packing Found In More Than 25% of Malicious Sites

4 days ago

Obfuscation techniques are extremely prevalent, data shows, but they can't be used as a single indicator of compromise because legitimate websites use them.

Deepfake Audio Scores $35M in Corporate Heist

4 days ago

A combination of business email compromise and deepfake audio led a branch manager to transfer millions to scammers, in a case that serves as a warning to organizations.

Geriatric Microsoft Bug Exploited by APT Using Commodity RATs

4 days ago

Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting a 20-year-old+ Microsoft Office bug that's as potent as it is ancient.

Not just deprecated, but deleted: Google finally strips File Transfer Protocol code from Chrome browser

4 days ago

A death by a thousand cuts The Chromium team has finally done it – File Transfer Protocol (FTP) support is not just deprecated, but stripped from the codebase in the latest stable build of the Chrome browser, version 95.…

NHS Digital exposes hundreds of email addresses after BCC blunder copies in entire invite list to 'Let's talk cyber' event

4 days ago

It's like rai-iiiiiin on your wedding day NHS Digital has scored a classic Mail All own-goal by dispatching not one, not two, not three, but four emails concerning an infosec breakfast briefing, each time copying the entirety of the invite list in on the ...

Centre for Computing History apologises to customers for 'embarrassing' breach

4 days ago

Website patched following phishing scam, no financial data exposed The Centre for Computing History (CCH) in Cambridge, England, has apologised for an "embarrassing" breach in its online customer datafile, though thankfully no payment card information was ...

When it comes to ransomware, every second hurts

4 days ago

Fortinet seeks to make EDR easy for non-specialists Sponsored  For the longest time it seemed that modern endpoint detection and response (EDR) was getting on top of the worst malware, only for that certainty to evaporate in a single day in June 2017 tha ...

Crims target telcos' Linux and Solaris boxes, which don't get enough infosec love

4 days ago

CrowdStrike says 'LightBasin' gang avoids Windows, and knows that telco networks run on badly-secured *nix A mysterious criminal gang is targeting telcos' Linux and Solaris boxes, because it perceives they aren't being watched by infosec teams that have f ...

Acer servers cracked in India and Taiwan – including systems with customer data

4 days ago

Gang says it grabbed internal info, could do the same to Acer elsewhere Taiwanese PC maker Acer has not only admitted servers it operates in India and and Taiwan were compromised but that only those systems in India contained customer data.…

Cyber incident takeover powers reintroduced to parliament

4 days ago

As ASIO raises 'concerns' about malware injection.

You've heard of HTTPS. Now get a load of HTTPA: Web services in verified remote trusted environments?

4 days ago

Intel duo propose fresh use of, yes, SGX but also Arm's TrustZone and similar TEEs Two Intel staffers believe web services can be made more secure by not only carrying out computations in remote trusted execution environments, or TEEs, but by also verifyi ...

Penetration Testing in the Cloud Demands a Different Approach

4 days ago

Attackers use a different set of techniques to target the cloud, meaning defenders must think differently when pen testing cloud environments.

Telecommunications Providers Worldwide Are Targeted in Sophisticated Cyber-Espionage Campaign

4 days ago

LightBasin has displayed in-depth knowledge of telecom architectures and protocols in its attacks, security vendor warns.

Cato Networks Valued at $2.5B, Raises Additional $200M to Accelerate SASE Adoption Among Large Enterprises

4 days ago

Cato more than doubles its valuation in one year with largest funding round to date. Total financing reaches $532 million.

Squirrel Bug Lets Attackers Execute Code in Games, Cloud Services

4 days ago

The out-of-bounds read vulnerability enables an attacker to escape a Squirrel VM in games with millions of monthly players – such as Counter-Strike: Global Offensive and Portal 2 – and in cloud services such as Twilio Electric Imp.

Enterprise Cybersecurity Strategies Are Getting More Attention

5 days ago

Data in Dark Reading's 2021 Strategic Security Survey report suggest organizations are taking the security challenge seriously.

Query.ai Closes $15M Series A for Security Investigations Tool

5 days ago

The funding will support product development for Query.AI's browser-based security investigations tool.

Fresh APT Harvester Reaps Telco, Government Data

5 days ago

The group is likely nation-state-backed and is mounting an ongoing spy campaign using custom malware and stealthy tactics.

BlackMatter ransomware gang will target agriculture for its next harvest – Uncle Sam

5 days ago

What was that about hackable tractors? The US CISA cybersecurity agency has warned that the Darkside ransomware gang, aka BlackMatter, has been targeting American food and agriculture businesses – and urges security pros to be on the lookout for indicat ...

Keysight Technologies Acquires SCALABLE Network Technologies

5 days ago

Simulation and modeling solutions augment Keysight's 5G and cybersecurity portfolio.

2021 State of Ransomware Report Reveals 83% of Victims Paid to Get Data Restored

5 days ago

Research by ThycoticCentrify shows a majority of organizations experienced a ransomware attack, while 93% are allocating special budget to fight growing threats.

CrowdStrike Invests in Microsoft AD Competitor JumpCloud

5 days ago

Closes out $225 million Series F with additional $66 million raised from Atlassian Ventures, CrowdStrike Falcon Fund, NTT Docomo Ventures, and others.

Candy Corn Maker Hit With Ransomware

5 days ago

Ferrara Candy Co. said a ransomware attack earlier this month won't affect Halloween supplies of its sweets, which include Brachs, Keebler, Sweet Tarts, and other popular brands.

Name That Toon: Bone Dry

5 days ago

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Privacy Management for Microsoft 365 Now Generally Available

5 days ago

The tool is designed to automatically discover personal data in organizations' Microsoft 365 environments.

Scrambling to counter a ransomware attack could leave you with egg on your face

5 days ago

Join this masterclass and learn how to plan a far more efficient response Sponsored  When you read about security teams “scrambling” to respond to a ransomware attack, what do you think is the real problem?…

Lyceum APT Returns, This Time Targeting Tunisian Firms

5 days ago

The APT, which targets Middle-Eastern energy firms & telecoms, has been relatively quiet since its exposure but not entirely silent. It's kept up attacks through 2021 and is working on retooling its arsenal yet again. 

Email phishing crapcannon operators TA505 are back from the dead, researchers warn

5 days ago

And they're packing a new dirty RAT as well A prolific email phishing threat actor – TA505 – is back from the dead, according to enterprise security software slinger Proofpoint.…

Winners Announced for 2021 Infosec Inspire Security Awareness Awards

5 days ago

Institute of International Education and Inflection Point Systems recognized for their advanced security awareness and training programs.

Former NSA Deputy Director William Crowell Joins [redacted] Board of Directors

5 days ago

Cybersecurity industry veteran brings substantial public and private sector experience to help guide [redacted] growth and expansion.

Data Privacy API Company Skyflow Raises $45M Series B Funding to Help Fintech and Healthtech Companies Ship Faster

5 days ago

Achieves 8x growth in last three quarters, and raises $70M in less than 18 months.

Veritas Simplifies Data Backup to the Cloud While Helping Reduce Costs and Increase Ransomware Resiliency

5 days ago

Introducing Veritas NetBackup Recovery Vault, a Veritas-managed cloud storage service.

UK competition watchdog unveils principles to make a kinder antivirus business

5 days ago

Treat customers fairly when it comes to auto-renewal. Or else The UK's Competition and Markets Authority (CMA) has unveiled compliance principles to curb locally some of the sharper auto-renewal practices of antivirus software firms.…

A Guide to Doing Cyberintelligence on a Restricted Budget

5 days ago

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment.

The Simmering Cybersecurity Risk of Employee Burnout

5 days ago

Why understanding human behavior is essential to building resilient security systems.

Feds Warn BlackMatter Ransomware Gang is Poised to Strike

5 days ago

An advisory by the CISA, FBI and NSA reveals hallmark tactics of and shares defense tips against the cybercriminal group that’s picked up where its predecessor DarkSide left off.

Damages Escalate Rapidly in Multi-Party Data Breaches

5 days ago

Analysis of the top-50 multi-party attacks over the past decade finds that nation-state-linked hackers focused on disruption and using stolen credentials cause the most damage.

TA505 Gang Is Back With Newly Polished FlawedGrace RAT

5 days ago

TA505 – cybercrime trailblazers with ever-evolving TTPs – have returned to mass-volume email attacks, flashing retooled malware and exotic scripting languages.

Reg scribe spends week being watched by government Bluetooth wristband, emerges to more surveillance

5 days ago

Home quarantine week was the price for an overseas trip, ongoing observation is the price of COVID-19 Feature  My family and I recently returned to Singapore after an overseas trip that, for the first time in over a year, did not require the ordeal of tw ...

Japanese messaging giant Line admits it mishandled user data, promises to do better

5 days ago

Sent user data to China without once thinking Beijing might decide to snoop, lied about server location Line, the Japan-based messaging and payments app with millions of users around Southeast Asia, has conceded that its data protection regimes had multip ...

7 Cross-Industry Technology Trends That Will Disrupt the World

5 days ago

Recent McKinsey & Company analysis examines which technologies will have the most momentum in the next ten years. These are the trends security teams need to be aware of in order to protect the organization effectively.

FIDO Alliance Research Tracks Passwordless Authentication as It Moves Mainstream

5 days ago

New Online Authentication Barometer from the FIDO Alliance reveals consumer habits, trends and adoption of authentication technologies.

Group With Potential Links to Iranian Threat Actor Resurfaces

5 days ago

The Lyceum group has previously been linked to attacks on targets in the Middle East.

Time to Build Accountability Back into Cybersecurity

5 days ago

Chris Hass, director of information security and research at Automox, discusses how to assign security responsibility, punishment for poor cyber-hygiene and IDing 'security champions' to help small businesses.

Loss Prevention Teams Up With Cybersecurity to Address Retail Fraud

6 days ago

As retailers roll out more "buy online, pickup in-store" options, loss prevention professionals are increasingly shifting their attention from in-store theft to e-commerce fraud.

Podcast: Could the Zoho Flaw Trigger SolarWinds 2.0?

6 days ago

Companies are worried that the highly privileged password app could let attackers deep inside an enterprise’s footprint, says Redscan’s George Glass.

Sinclair Confirms Ransomware Attack That Disrupted TV Stations

6 days ago

A major cyberattack resulted in data being stolen, too, but Sinclair's not sure which information is now in the hands of the crooks.

NSA, FBI, CISA Issue Advisory on 'BlackMatter' Ransomware

6 days ago

Ransomware has become a "national security issue," NSA director said.

(ISC)² Plans Entry-Level Certification for Aspiring Security Pros

6 days ago

The certification aims to help new entrants to the security field with professional development and career paths early on.

Sinclair Broadcast Group Confirms Ransomware Attack

6 days ago

The US television station operator has revealed certain servers and workstations, as well as office and operational networks, were disrupted in the attack.

TikTok Serves Up Fresh Gamer Targets via Fake Among Us, Steam Offerings

6 days ago

The tween-friendly video app is being used to serve up malvertising, disguised as free Steam game accounts or Among Us game hacks.

Microsoft called out as big malware hoster – thanks to OneDrive and Office 365 abuse

6 days ago

Infosec pro: 'OneDrive abuse has been going on for years' Microsoft has been branded as "the world's best malware hoster for about a decade," thanks to abuse of the Office 365 and Live platform, as well as its slow response to reports by security research ...

Twitter Suspends Accounts Used to Snare Security Researchers

6 days ago

The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.

In Cyberwar, Attribution Can Be Impossible — and That's OK

6 days ago

Instead of using a substantial proportion of resources to determine attribution, organizations should focus on defenses that will help them remediate an attack.

Chinese tech minister says he's 'dealt with' 73,000 websites that breached the law

6 days ago

Ongoing crackdown saw apps 1.83 million apps tested, 4,200 told to clean up their act, pop-up ads popped China's Minister of Industry and Information Technology, Xiao Yaqing, has given a rare interview in which he signalled the nation's crackdown on the i ...

Whatever sort of disaster we’re talking about, if your backups are fried, you’re not going to recover

6 days ago

Here’s how zero trust and immutability can save you Sponsored  When you’re putting your enterprise security and data management strategy in place, should you worry more about ransomware or natural disasters?…

US gov claims ransomware 'earned' $590m in the first half of 2021 alone – mostly in Bitcoin

6 days ago

Names and bars crypto exchange SUEX, warns paying ransoms could spell trouble Ransomware extracted at least $590 million for the miscreants who create and distribute it in the first half of 2021 alone – more than the $416 million tracked in all of 2020, ...

Transport for NSW group CISO to exit

1 week ago

Heading back to the private sector.

Amazon's Twitch says source code exposed in data breach

1 week ago

But not login credentials or credit card details.

US Treasury puts crypto industry on notice over rising ransomware attacks

1 week ago

Payments climb to $795 million in first six months.

NFTs not annoying enough? Now they come with wallet-emptying malware

1 week ago

Plus rifle-toting robot dogs, but makers insist they're really dumb In brief  Whether or not non-fungible tokens are a flash in the pan or forever, malware operators have been keen to weaponise the technology.…

10 Hot Red Team Tools Set to Hit Black Hat Europe

1 week ago

The slate of Arsenal presentations at Black Hat Europe is set to feature lots of low-cost and free goodies for offensive security pros.

Amazon textbook rental service scammed for $1.5m

1 week ago

Michigan man arrested for borrowing costly textbooks and selling them A 36-year-old man from Portage, Michigan, was arrested on Thursday for allegedly renting thousands of textbooks from Amazon and selling them rather than returning them.…

China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes

1 week ago

China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.

Cisco Duo Trusted Access Report: More Than 50% of Companies Plan Passwordless Move

1 week ago

Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.

TrickBot Gang Enters Cybercrime Elite with Fresh Affiliates

1 week ago

The group – which also created BazarLoader and the Conti ransomware – has juiced its distribution tactics to threaten enterprises more than ever.

Missouri Vows to Prosecute ‘Hacker’ Who Disclosed Data Leak

1 week ago

Missouri Gov. Mike Parson launched a criminal investigation of a reporter who flagged a state website that exposed 100K+ Social-Security numbers for teachers and other state employees.

How Attackers Hack Humans

1 week ago

Inside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.

'Clumsy' BlackByte Malware Reuses Crypto Keys, Worms Into Networks

1 week ago

Discovered during a recent incident response engagement, the malware avoids Russian computers and uses a single symmetric key for encrypting every compromised system.

Evolution Equity Partners Close $400M for Cybersecurity Investments

1 week ago

The firm expands capital base, team, and platform addressing a rapidly growing cybersecurity investment opportunity.