Security Experts:

long dotted


South Pacific Ocean nation Vanuatu is slowly getting its communications back online following a cyberattack that knocked out emergency services, emails and phone lines for weeks. [Read More]
The hackers leaking stolen Australian records from Medibank to the dark web appeared to end their extortion attempt by dumping a final batch of data online and declaring:"Case closed." [Read More]
According to data from Tenable, more than 70 percent of global organizations remain vulnerable to the Log4Shell flaw as of October this year. [Read More]
Sphere Technology Solutions, a New Jersey startup building technology to help defenders clean up excessive and unnecessary access, raises a $31 million Series B round. [Read More]
Google has linked three exploitation frameworks, as well as several vulnerabilities that were likely zero-days at one point, to Spanish commercial spyware vendor Variston. [Read More]
A China-linked cyberespionage group has been observed using self-replicating malware on USB drives to infect targets. [Read More]
The Black Basta ransomware gang has taken credit for the attack on Canadian meat giant Maple Leaf Foods. [Read More]
Initial access brokers are selling access to enterprise environments that have been compromised via a recently patched critical Fortinet vulnerability. [Read More]
CISA has warned organizations about CVE-2021-35587, a critical Oracle Fusion Middleware vulnerability that has been exploited in attacks. [Read More]
Southampton County in Virginia has started informing individuals that their personal information might have been compromised in ransomware attack. [Read More]


rss icon

Derek Manky's picture
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Landon Winkelvoss's picture
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Joshua Goldfarb's picture
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Derek Manky's picture
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.
Derek Manky's picture
Organization must remain hyper-vigilant and upgrade their defenses as thoroughly and quickly as possible.
Joshua Goldfarb's picture
The strategies used by attackers and fraudsters to profit from cryptocurrency are not new. Here are five steps end-users can take to protect themselves.
Landon Winkelvoss's picture
Similar to investigations that disrupt cyberattacks on retailers, the same tactics, techniques, and procedures (TTPs) can be leveraged against those that sell counterfeit or stolen goods.
Derek Manky's picture
While the sky just may be the limit (or actually, it may not be), when it comes to cybercriminals, three key areas where we expect to see more activity in the coming year are space, digital wallets and esports.
Derek Manky's picture
Public and private entities need to collaborate by sharing threat information and attack data to make attacks more difficult and resource-intensive for cybercriminals.