Network SecurityPHP bug executes RCEs, cryptominers and DDoS attacksAkamai researchers say its honeypots found numerous attempts to exploit recently disclosed vulnerability.
Network SecurityNATO members increasingly targeted by state-sponsored cyberattacksNATO countries are finding themselves at increased risk for cyberattacks from nations opposed to the international alliance.
Network SecurityChinese threat group APT40 targeting end-of-life devices, agencies warnA joint advisory from top U.S. allies details how APT40 targets vulnerable end-of-life devices within hours or days of a PoC’s release.
DevSecOpsHow to build an effective DevSecOps teamHere are three ways to bridge the gap between cybersecurity and development teams.
Data SecurityTicketmaster shakes off claims that hackers nicked Taylor Swift tixNo risk to systems following claims ticket barcodes for upcoming Taylor Swift concerts were stolen, said Ticketmaster.
RansomwareNew ransomware group Eldorado targets mainly US organizations Ransomware-as-a-service group targets the real estate, education, professional services, healthcare, and manufacturing sectors.
RansomwareVictims of cyber extortion and ransomware increase in 2024Ransomware victims can be hit multiple times by affiliate gangs in "re-victimization."
Network SecurityNew phishing tactic hijacks email protections to mask linksBarracuda researchers discovered phishing links “wrapped” by legitimate URL protection services.
Network SecurityPoseidon malware menaces Mac users via GoogleAdsA particularly nasty new piece of MacOS malware has experts issuing warnings for both users and administrators
Threat IntelligenceGoogle details nightmare whack-a-mole scenario with Dragonbridge disinfo campaignResearchers with Google’s security arm say they have been dealing with a particularly nasty Chinese disinformation group responsible for hundreds of thousands of malicious accounts.
How to bridge the gap between the IT and legal staffs to better combat insider riskJoe PayneApril 2, 2024
It makes sense for the Biden administration to focus on software security – but it’s up to the industry to make it happen John Funge November 29, 2023
Five attack vectors that businesses should focus on in the wake of the Israel-Hamas warJeremiah Fowler November 6, 2023