Small Businesses Need Default Security in Products Now
Small businesses are increasingly being targeted by cyberattackers. Why, then, are security features priced at a premium? Small businesses are…
Fighting Third-Party Risk With Threat Intelligence
With every new third-party provider and partner, an organization’s attack surface grows. How, then, do enterprises use threat intelligence to…
‘Stargazer Goblin’ Amasses Rogue GitHub Accounts to Spread Malware
The threat group uses its “Stargazers Ghost Network” to star, fork, and watch malicious repos to make them seem legitimate,…
Cyberattackers Exploit Microsoft SmartScreen Bug in Stealer Campaign
The good news: Only organizations far behind on standard Windows patching have anything to worry about. The good news: Only…
Hamster Kombat Players Threatened by Spyware & Infostealers
Players can only access the game by first joining its Telegram channel, with some going astray in copycat channels with…
CrowdStrike Blames Crash on Buggy Security Content Update
CrowdStrike vows to provide customers with greater control over the delivery of future content updates by allowing granular selection of…
Robot Dog Internet Jammer
Supposedly the DHS has these: The robot, called “NEO,” is a modified version of the “Quadruped Unmanned Ground Vehicle” (Q-UGV)…
Navigating the Complex Landscape of Web Browser Security
The more we use the cloud, the more maintaining browser security becomes crucial. The more we use the cloud, the…