Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
The company’s marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses. → Read More
Almost all applications contain at least some open source code, and 48% of all code bases examined by Synopsys researchers contained high-risk vulnerabilities. → Read More
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports. → Read More
CrowdStrike says cybercrime gang Scattered Spider has exploited longtime Windows security issues to use bring-your-own-vulnerable-driver (BYOVD) techniques against its own and other endpoint tools. → Read More
India, the US, Indonesia, and China accounted for 40% of the total reported cyberattacks in the government sector. → Read More
The LockBit ransomware-as-a-service operation said it is against its rules to attack medical institutions, but the ransomware gang's affiliates do not always adhere to this policy. → Read More
Hyperautomation and the move to optimize business processes are fueling uptake and sales for low-code development technologies, which will grow by 19% over the next four years to reach $44.5 billion by 2026, Gartner says. → Read More
Layoffs are expected in multiple locations and departments including IT, and will affect all levels of employees, according to sources. → Read More
DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies. → Read More
State-sponsored threat actors have targeted 128 government organizations in 42 countries that support Ukraine, as ransomware and DDoS rank as top forms of cyberattacks, says the EU Agency for Cybersecurity (ENISA). → Read More
Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data. → Read More
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems. → Read More
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type. → Read More
While currently the campaign is only involved in cryptojacking, it exploits DLL sideloading, which can be used to deploy spyware or ransomware. → Read More
Since the shift to remote and hybrid work, 44% of organizations have witnessed an increase in exploits targeting VPNs, and many are moving toward zero-trust security, according to a report from Zscaler. → Read More
Malicious hackers hone their tradecraft, reducing the time it takes to move from an initial compromised host machines to other components in enterprise networks, CrowdStrike says. → Read More
Securing cyberinsurance coverage for retail organizations has become difficult because of the increasing number of attacks. → Read More
A Trend Micro report reveals that 52% of global organizations have a supply chain partner that was hit by ransomware. → Read More
TikTok says that data samples are publicly accessible information and not a result of compromise of their systems, networks, or database. → Read More
The pessimistic outlook is due to inflation, the weakening global economy, and a surge in buying over the past two years. → Read More