Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat actor known as Sandworm was inside telecom operator Kyivstar’s systems at least...
Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker who already has access...
Two British teens part of the LAPSUS$ cyber crime and extortion gang have been sentenced for their roles in orchestrating a string...
Threat hunters have discovered a rogue WordPress plugin that’s capable of creating bogus administrator users and injecting malicious JavaScript code to steal...
John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report 2023 What...
Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially motivated actors...
The U.S. Justice Department (DoJ) has officially announced the disruption of the BlackCat ransomware operation and released a decryption tool that more...
Cybersecurity researchers have shed light on the inner workings of the ransomware operation led by Mikhail Pavlovich Matveev, a Russian national who...
Some of you have already started budgeting for 2024 and allocating funds to security areas within your organization. It is safe to...
Over the past few years, SaaS has developed into the backbone of corporate IT. Service businesses, such as medical practices, law firms,...
A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is being used as a covert data transfer...
A previously unknown hacker outfit called GambleForce has been attributed to a series of SQL injection attacks against companies primarily in the...
Let’s begin with a thought-provoking question: among a credit card number, a social security number, and an Electronic Health Record (EHR), which...
Microsoft Copilot has been called one of the most powerful productivity tools on the planet. Copilot is an AI assistant that lives...
The U.S. Department of Justice (DOJ) and the FBI recently collaborated in a multinational operation to dismantle the notorious Qakbot malware and...
In a rapidly evolving digital landscape, it’s crucial to reevaluate how we secure web environments. Traditional antivirus-approach solutions have their merits, but...
A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. “While...
Cybersecurity researchers have detailed a “severe design flaw” in Google Workspace’s domain-wide delegation (DWD) feature that could be exploited by threat actors...
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a single set of stolen...
The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian’s engineers had...
In this article, we will provide a brief overview of Silverfort’s platform, the first (and currently only) unified identity protection platform on...