Multiple top CISA officials behind ‘Secure by Design’ resign
Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the…
Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the…
Microsoft confirms that the weekend Entra account lockouts were caused by the invalidation of short-lived user refresh tokens that were mistakenly logged into internal systems. On Saturday…
Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to maintain system health and improve security posture. In today’s rapidly evolving…
I recently converted (from TextMate) to using vim for all of my text editing, and it turns out there are a number of places where…
Microsoft Corp. on Monday said it has reached additional milestones in a multiyear effort to strengthen its product development, threat detection and corporate governance structure…
Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have become the backbone of modern enterprises. While they offer flexibility and…
In 2024, financial institutions around the globe suffered an average loss of $6.08 million due to ransomware attacks. This marked a 10% increase compared to…
Apr 21, 2025Ravie LakshmananTechnology / Mobile Security A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals…
As a security consultant I do quite a bit of travel for my job. It’ssomething I enjoy immensely, but standing in airport security lines canquickly…
For enterprises, the cloud is no longer just an option; it’s a necessity. With 80% of businesses now viewing the public cloud as vital to their…
ClickFix attacks are gaining traction among threat actors, with multiple advanced persistent threat (APT) groups from North Korea, Iran, and Russia adopting the technique in…
As organizations gear up for 2025, third-party risk management (TPRM) remains a top priority. The need to manage risks associated with vendors and partners has…