The US Department of Justice has updated its policy regarding violations of CFAA to clearly state that ethical hacking should not be prosecuted. [Read More]
As Ukrainians flooded into Poland, Russian invaders, a hacking group aligned with the Kremlin sought to spread rumors that criminal gangs were waiting to harvest the organs of child refugees. [Read More]
Researchers have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. [Read More]
The US government has warned that rogue IT workers from North Korea enable DPRK hacking operations and provide logistical support for its threat actors. [Read More]
Tesla CEO Elon Musk says his deal to buy Twitter can’t move forward unless the company shows public proof that less than 5% of the accounts on the social media platform are fake or spam. [Read More]
Researchers at NCC Group create a tool for conducting a new type of Bluetooth Low Energy (BLE) relay attack that bypasses existing protections. [Read More]
The Conti ransomware gang that infiltrated some Costa Rican government computer systems has upped its threat, saying its goal is now to overthrow the government. [Read More]
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.
Most organizations rely too heavily on their cybersecurity pros to protect them from threats, ignoring the painful reality that human error is by far the most common cause of security breaches.