We have seen this group not only replicate the portals of the WHO, but major research universities and many other...
Information Security
Attacks on government at the federal, state and local levels have come over the past two weeks —including a ransomware...
The findings showed that almost one in four Americans stop doing business with companies who have been hacked, and more...
The attack started with a malicious link in a phishing email that allowed attackers to pivot from the facility’s IT...
This is happening over and over again. In January, it was schools in California, in November it was a company...
The extensions were part of a long-running malvertising and ad-fraud scheme that was discovered by independent researcher Jamila Kaya. She...
"If you've got 200 workers working in one place and one of them presents themselves with the illness, it's pretty...
The week-long sextortion campaign that used the Emotet botnet for dissemination was able to collect almost $60,000 from victims by...
While researchers noticed the Wi-Fi spreading binary being delivered for the first time on Jan. 23, they said that the...
Importantly, Amazon secures S3 buckets by default. In other words, for a bucket to be publicly accessible to any old...