Commercial Spyware Use Roars Back Despite Sanctions
Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to…
Cyber Facts You Didn't Know
Vendors of mercenary spyware tools used by nation-states to track citizens and enemies have gotten savvy about evading efforts to…
The vulnerabilities affect industrial control tech used across the healthcare and critical manufacturing sectors. The vulnerabilities affect industrial control tech…
In the past, Putin’s Unit 29155 has utilized malware like WhisperGate to target organizations, particularly those in Ukraine. In the…
SonicWall has revealed that a recently patched critical security flaw impacting SonicOS may have come under active exploitation, making it…
The Biden administration launches an initiative to encourage careers in cybersecurity, as businesses try new tactics to get unfilled IT…
Threat actors have long leveraged typosquatting as a means to trick unsuspecting users into visiting malicious websites or downloading booby-trapped…
A recently disclosed security flaw in OSGeo GeoServer GeoTools has been exploited as part of multiple campaigns to deliver cryptocurrency…
There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack,…
No organization can single-handedly defend against sophisticated attacks. Governments and private sector entities need to collaborate, share information, and develop…
The 2024 State of the vCISO Report continues Cynomi’s tradition of examining the growing popularity of virtual Chief Information Security…