Cybercrime
The U.S. State Department and the National Counterintelligence and Security Center (NCSC) on Friday issued a warning over the use of commercial surveillance tools.
Hi, what are you looking for?
Learn how attackers hide in plain sight—and what you can do to stop them without slowing down your business.
The U.S. State Department and the National Counterintelligence and Security Center (NCSC) on Friday issued a warning over the use of commercial surveillance tools.
With eyes firmly set on the booming attack surface management space, threat intel powerhouse Recorded Future is shelling out $65 million to purchase SecurityTrails,...
The world is entering a new era dominated by the rise of peer competitors like China and Russia, who are increasingly exerting their geo-political...
The U.S. Federal Trade Commission (FTC) on Tuesday informed companies that they could face legal action if their customers are impacted by an attack...
Boston-based cyber insurance company Corvus on Tuesday announced the acquisition of UK-based cyber underwriting platform Tarian Underwriting Limited from Beat Capital Partners.Following the acquisition,...
Gabriel Weinberg’s DuckDuckGo is taking aim at the desktop browser market, betting that default privacy-centric settings will provide safer alternatives to Google’s Chrome and...
Government agencies in the United States, Canada, the United Kingdom, Australia and New Zealand on Wednesday announced the release of a joint cybersecurity advisory...
A large-scale, long-term phishing experiment conducted in a 56,000-employee organization has come to a startling conclusion: Those simulated phishing tests commonly seen in corporate...
French video game company Ubisoft this week confirmed that 'Just Dance' user data was compromised in a recent cybersecurity incident.The data breach was the...
China’s Ministry of Industry and Information Technology (MIIT) said it will temporarily suspend its collaboration with Alibaba Cloud as a cyber threat intelligence partner...
Cybersecurity and cyber resilience measures are most effective when applied in concert
The computer security industry is bracing for travel on long, bumpy roads littered with Log4j security problems as experts warn that software dependency patching...
Current security technology stacks are not keeping up with the increasing scale and sophistication of attacks
Security researchers at Google’s Project Zero have picked apart one of the most notorious in-the-wild iPhone exploits and found a never-before-seen hacking roadmap that...
Fresh off a high-profile legal triumph over Apple, virtualization technology startup Corellium is now enjoying the attention of investors with Paladin Capital Group leading...
The United States Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday called on critical infrastructure owners and operators to improve their security stance against...
The widely used Log4j logging tool is affected by a critical remote code execution vulnerability that has been increasingly exploited by malicious actors, including...
Developers of the widely used Apache Log4j Java-based logging tool have disabled problematic functionality as more security issues have come to light.