Cyber Security
Security researchers have noticed a new malicious spam campaign that delivers the ‘Matanbuchus’ malware to drop Cobalt Strike beacons on compromised machines. Cobalt Strike...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
Security researchers have noticed a new malicious spam campaign that delivers the ‘Matanbuchus’ malware to drop Cobalt Strike beacons on compromised machines. Cobalt Strike...
The Digital Operational Resilience Act would force non-EU companies with a significant presence in member states to create subsidiaries that can be regulated under...
When it comes to federal cybersecurity policy, the executive branch is far ahead of Congress. The White House’s cyber executive order and subsequent policies...
Montrose Environmental Group, a US-based provider of environmental services, has revealed it was hit by a ransomware attack last weekend that disrupted its laboratory testing...
A memcached injection vulnerability in business webmail platform Zimbra could allow attackers to steal login credentials without user interaction, security researchers have revealed. Zimbra,...
An eye-watering 24 billion usernames and passwords available on the dark web – an increase of 65% in just two years, according to a new study...
A cybersecurity researcher was threatened with legal action for describing vulnerabilities in Powertek PDUs after patches were released. The vulnerabilities – two deemed critical...
Security engineers are proposing an experimental protocol that promises greater privacy in how DNS, the internet’s equivalent of a telephone directory, operates. Oblivious DNS-over-HTTPS (ODoH)...
Some attacks on smartphones require physical access to the device and interactions with the touchscreen. So your phone is more or less safe as...
The healthcare and personal information of up to 70,000 Kaiser Permanente patients in Washington state may have been exposed following unauthorized access to the...
Recent Comments