Why Are Organizations Losing the Ransomware Battle?
Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving…
Identity illuminated
Institutionalizing and sustaining fundamental cybersecurity practices requires a commitment to ongoing vigilance, active management, and a comprehensive understanding of evolving…
Chinese-speaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT. “ValleyRAT is a multi-stage malware…
SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these…
The Open-Source Software Prevalence Initiative, announced at DEF CON, will examine how open source software is used in critical infrastructure.…
The press is reporting a critical Windows vulnerability affecting IPv6. As Microsoft explained in its Tuesday advisory, unauthenticated attackers can…
Cybersecurity researchers have uncovered new stealer malware that’s designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it’s offered…
A large percentage of Google’s own Pixel devices shipped globally since September 2017 included dormant software that could be used…
A great many readers this month reported receiving alerts that their Social Security Number, name, address and other personal information…
The attack affects organizations that have synced multiple on-premises Active Directory domains to a single Azure tenant. The attack affects…
The vulnerability was given a high-severity CVSS score, indicating that customers should act swiftly to mitigate the flaw. The vulnerability…