Meet UNC1860: Iran’s Low-Key Access Broker for State Hackers
The group has used more than 30 custom tools to target high-value government and telecommunications organizations on behalf of Iranian…
Microsoft Trims Cloud Cyberattack Surface in Security Push
The company has jettisoned hundreds of thousands of unused apps and millions of unused tenants as part of its Secure…
Kaspersky Rolls Back for US Customers, Makes Way for UltraAV
Some users complain they had no idea the switch would be automatic on their devices, vowing to uninstall the unwanted…
Mastercard’s Bet on Recorded Future a Win for Cyber Threat Intel
The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies. The $2.65B buy validates the growing…
Target Practice: Honing Critical Skills on Cyber Ranges
Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies — while…
Commerce Dept. Proposes Ban on Automotive Software & Hardware From China, Russia
After launching an investigation in February into vehicles made by foreign adversaries, the Biden administration is finally making its move…
Hacking the “Bike Angels” System for Moving Bikeshares
I always like a good hack. And this story delivers. Basically, the New York City bikeshare program has a system…
Data Security Posture Management: Accelerating Time to Value
Data discovery and classification are foundational for data security, data governance, and data protection. Data discovery and classification are foundational…