While phishing campaigns are nothing new, this "as-a-service" approach is a bit concerning, as it makes it easier for people...
Technology Management
"The potency of the Chaos malware stems from a few factors," Black Lotus Labs researchers wrote in a Wednesday morning blog...
The bank improperly disposed of thousands of devices and some were auctioned off online without checking that customer data they...
The phrase "zero trust" has become a sometimes meaningless buzzword in the security industry, but the Uber breach seems to...
Cyberattacks hit a record high in 2021, continuing the momentum that had developed during the COVID-19 pandemic. One reason for...
Nelnet Serving, a Nebraska-based student loan technology services provider, has been breached by unauthorized network intruders who exploited a vulnerability...
A novel data exfiltration technique has been found to leverage a covert ultrasonic channel to leak sensitive information from isolated,...
Security researchers have discovered over 80,000 Hikvision cameras vulnerable to a critical command injection flaw that's easily exploitable via specially...
The security issue is a high-severity risk identified as CVE-2022-0028 that allows a remote threat actor to deploy reflected and...
With system administrators, network admins, and security professionals already under significant stress as they try to keep up with the...