Accused cybercriminal has special skills that helped Conti and LockBit ransomware evade detection, according to law enforcement.
Read moreObtaining — and maintaining — a complete inventory of technology assets is essential to effective enterprise security. How do organizations...
Read moreAn RCE vulnerability that affects the Web scripting language on Windows systems is easy to exploit and can provide a...
Read moreAlignment between these domains is quickly becoming a strategic imperative.
Read moreJun 12, 2024NewsroomKubernetes / Endpoint Security Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to...
Read moreLast week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from...
Read moreJun 12, 2024NewsroomRansomware / Endpoint Security Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed...
Read moreThe threat group behind breaches at Caesars and MGM moves its business over to a different ransomware-as-a-service operation.
Read moreJun 12, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have disclosed details of an ongoing phishing campaign that leverages recruiting- and...
Read moreJun 12, 2024Newsroom State-sponsored threat actors backed by China gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a...
Read more