Cybersecurity Articles

People Still Matter in Cybersecurity Management

People Still Matter in Cybersecurity Management

Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files

Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files

QR Code 101: What the Threats Look Like

QR Code 101: What the Threats Look Like

Government Shutdown Poised to Stress Nation's Cybersecurity Supply Chain

Government Shutdown Poised to Stress Nation

Chrome Flags Third Zero-Day This Month That's Tied to Spying Exploits

Chrome Flags Third Zero-Day This Month That

Student Loan Breach Exposes 2.5M Records

Student Loan Breach Exposes 2.5M Records

Watering Hole Attacks Push ScanBox Keylogger

Watering Hole Attacks Push ScanBox Keylogger

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms

Ransomware Attacks are on the Rise

Ransomware Attacks are on the Rise

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

Update on Naked Security

Update on Naked Security

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

S3 Ep149: How many cryptographers does it take to change a light bulb?

S3 Ep149: How many cryptographers does it take to change a light bulb?

Using WinRAR? Be sure to patch against these code execution bugs…

Using WinRAR? Be sure to patch against these code execution bugs…

Smart light bulbs could give away your password secrets

Smart light bulbs could give away your password secrets

Diverse threat intelligence key to cyberdefense against nation-state attacks

Diverse threat intelligence key to cyberdefense against nation-state attacks

Asian banks are a favorite target of cybercooks, and malicious bots their preferred tool

Asian banks are a favorite target of cybercooks, and malicious bots their preferred tool

IT teams are taking on more responsibilities with hybrid work and cloud adoption

IT teams are taking on more responsibilities with hybrid work and cloud adoption

Your Bard conversations are someone else's Google results

Your Bard conversations are someone else

The latest Windows 11 update is rolling out now. Here's what's new

The latest Windows 11 update is rolling out now. Here

US Justice Department Urged to Investigate Gunshot Detector Purchases

US Justice Department Urged to Investigate Gunshot Detector Purchases

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

SoundThinking, Maker of ShotSpotter, Is Buying Parts of PredPol Creator Geolitica

Risk of a US Government Shutdown Is Fueled by Very Online Republicans

Risk of a US Government Shutdown Is Fueled by Very Online Republicans

Satellite Images Show the Devastating Cost of Sudan’s Aerial War

Satellite Images Show the Devastating Cost of Sudan’s Aerial War

A Tricky New Way to Sneak Past Repressive Internet Censorship

A Tricky New Way to Sneak Past Repressive Internet Censorship

Malicious ads creep into Bing Chat responses

Malicious ads creep into Bing Chat responses

Dialpad PII Redaction enhances privacy protection

Dialpad PII Redaction enhances privacy protection

Bitdefender Threat Intelligence enables organizations to improve their security posture

Bitdefender Threat Intelligence enables organizations to improve their security posture

Blackpoint Cyber unveils Cloud Response for Google Workspace

Blackpoint Cyber unveils Cloud Response for Google Workspace

Conceal partners with CyberForce Security to elevate MSSP services with advanced browser security

Conceal partners with CyberForce Security to elevate MSSP services with advanced browser security

Chinese threat actors stole around 60,000 emails from US State Department in Microsoft breach

Chinese threat actors stole around 60,000 emails from US State Department in Microsoft breach

Misconfigured WBSC server leaks thousands of passports

Misconfigured WBSC server leaks thousands of passports

CISA adds JBoss RichFaces Framework flaw to its Known Exploited Vulnerabilities catalog

CISA adds JBoss RichFaces Framework flaw to its Known Exploited Vulnerabilities catalog

Cisco urges to patch actively exploited IOS zero-day CVE-2023-20109

Cisco urges to patch actively exploited IOS zero-day CVE-2023-20109

Dark Angels Team ransomware group hit Johnson Controls

Dark Angels Team ransomware group hit Johnson Controls

North Korean hackers posed as Meta recruiter on LinkedIn

North Korean hackers posed as Meta recruiter on LinkedIn

Mayorkas warns Latin American leaders of Beijing’s technology influence

Mayorkas warns Latin American leaders of Beijing’s technology influence

Privacy watchdog recommends court approval for FBI searches of spy data

Privacy watchdog recommends court approval for FBI searches of spy data

New working group to probe AI risks and applications

New working group to probe AI risks and applications

Millions of files with potentially sensitive information exposed online, researchers say

Millions of files with potentially sensitive information exposed online, researchers say

Privacy Regulator Orders End to Spreadsheet FOI Responses

Privacy Regulator Orders End to Spreadsheet FOI Responses

Microsoft Breach Exposed 60,000 State Department Emails

Microsoft Breach Exposed 60,000 State Department Emails

MOVEit Developer Patches Critical File Transfer Bugs

MOVEit Developer Patches Critical File Transfer Bugs

Budworm APT Evolves Toolset, Targets Telecoms and Government

Budworm APT Evolves Toolset, Targets Telecoms and Government

Booking.com Customers Targeted in Major Phishing Campaign

Booking.com Customers Targeted in Major Phishing Campaign

CISA, NSA, FBI and Japan warn of BlackTech, PRC-linked cyber activity

CISA, NSA, FBI and Japan warn of BlackTech, PRC-linked cyber activity

Security leaders discuss implications as Sony investigates recent cyber attack

Security leaders discuss implications as Sony investigates recent cyber attack

US businesses see cyberattacks decrease; Still too high to sustain

US businesses see cyberattacks decrease; Still too high to sustain

Department of Defense overhauls cyber strategy: Experts weigh in

Department of Defense overhauls cyber strategy: Experts weigh in

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment

Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data

Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data

Protect Your Passwords for Life for Just $30

Protect Your Passwords for Life for Just $30

Best SIEM Tools and Software for 2023

Best SIEM Tools and Software for 2023

How To Implement Zero Trust: Best Practices and Guidelines

How To Implement Zero Trust: Best Practices and Guidelines

NordVPN Review (2023): Pricing, Security & Performance

NordVPN Review (2023): Pricing, Security & Performance

Vulnerability resolution enhanced by integrations

Vulnerability resolution enhanced by integrations

How I got started: SIEM engineer

How I got started: SIEM engineer

Tequila OS 2.0: The first forensic Linux distribution in Latin America

Tequila OS 2.0: The first forensic Linux distribution in Latin America

Cost of a data breach 2023: Geographical breakdowns

Cost of a data breach 2023: Geographical breakdowns

The Growing Risks of Shadow IT and SaaS Sprawl

The Growing Risks of Shadow IT and SaaS Sprawl