Distributing Security Responsibilities (Responsibly)
Outlining the wider organization’s proactive role in fortifying the security program allows the security team to focus on the most…
Offensive AI: The Sine Qua Non of Cybersecurity
“Peace is the virtue of civilization. War is its crime. Yet it is often in the furnace of war that…
Mimecast Joins Human Risk Management Fray With Code42 Deal
Mimecast’s acquisition of Code42 helps the company move into insider risk management, joining key rival Proofpoint and others in the…
U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals
The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly…
CrowdStrike Warns of New Phishing Scam Targeting German Customers
CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on the Falcon Sensor update fiasco to distribute dubious…
Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining
Cybersecurity researchers are sounding the alarm over an ongoing campaign that’s leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining.…
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical security flaw…
Feds Warn of North Korean Cyberattacks on US Critical Infrastructure
The Andariel group is targeting critical defense, aerospace, nuclear, and engineering companies for data theft, the FBI, NSA, and others…