The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and ...
Researchers discovered a vulnerable driver embedded in Black Basta's ransomware, illustrating the increasing popularity of ...
Tool sprawl is eroding cloud security. Enterprises must rethink identity, access, and operations through a unified, ...
The ransomware group breached SmarterTools through a vulnerability in the company's own SmarterMail product. SmarterTools recently disclosed a breach that occurred as a result of vulnerabilities the ...
Malicious "skills" and persnickety configuration are just a few issues that security researchers have found when installing the OpenClaw AI assistant.
Security and privacy concerns are growing. The Electronic Frontier Foundation sees encryption as the "best way" to protect ...
Recent supply chain attacks involving self-propagating worms have spread far, but the damage and long-term impact is hard to ...
KEV Collider combines data from multiple open source vulnerability frameworks to help cybersecurity teams assess which issues ...
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed ...
By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," ...
Security teams need to be thinking about this list of emerging cybersecurity realities, to avoid rolling the dice on ...
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ...