Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products. Only one -- but the second most exploited -- was an...
Hi, what are you looking for?
Eight of the top ten most exploited vulnerabilities in 2018 affected Microsoft products. Only one -- but the second most exploited -- was an...
The Australian Signals Directorate (ASD), Australia's intelligence agency responsible for foreign signals intelligence, has joined America's NSA and the UK's GCHQ in publishing an...
A new variant of the Ursnif trojan has been discovered targeting Japan since the beginning of 2019. Japan is a common target for Ursnif,...
Elizabeth Warren wants to be the Democrat nominee in the 2020 presidential election. Last week she added a new promise to her manifesto: "It's...
The UK is in a momentous political week. Three separate parliamentary votes will decide the future of the UK and the EU for many...
Jackson County, Georgia is just a little over 60 miles from the City of Atlanta. In March 2018, Atlanta was struck by a major...
2001 was not a good year for Microsoft. Its servers were ravaged by the Code Red and Nimda worms. In 2002, Bill Gates responded...
The growth of Russia's attempts to manipulate American public opinion since 2015 is well known and documented. At heart, it is basic political propaganda...
Report Shows Major Disconnect Between Cybersecurity and Cyber Everywhere in Digital Transformation
Cybersecurity startup firm PolySwarm has officially launched at this year's RSAC. It describes itself as a 'VirusTotal replacement', and is an innovative malware detection...
Fileless attacks are increasing and are more likely to succeed than traditional file-based malware. Most defenses seek to detect them by recognizing anomalous behavior...
5,558 IT professionals from more than 150 countries involved in DevOps self-identified their level of maturity. What emerged from a subsequent survey was a...