Addressing Election Security At 39th Annual National Conference
During the Election Center 39th Annual National Conference held in Detroit on September 9, 2024, Jen Easterly, the Director of the Cybersecurity and Infrastructure Security…
During the Election Center 39th Annual National Conference held in Detroit on September 9, 2024, Jen Easterly, the Director of the Cybersecurity and Infrastructure Security…
The FBI’s Cryptocurrency Fraud Report for 2023, highlights a sharp rise in cyber-enabled financial crimes involving cryptocurrency. In 2023 alone, the FBI’s Internet Crime Complaint…
A new variant of the ongoing sextortion email scams is now targeting spouses, saying that their husband or wife is cheating on them, with links…
Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since 2011. This APT group primarily…
Crashes due to faulty updates are nothing new; in fact, one reason IT teams often delay updates is their unreliability and tendency to disrupt the…
From zero-day exploits to polymorphic malware, today’s organizations must protect themselves against increasingly sophisticated cyber threats. But while these types of complex attack vectors may be making the news,…
Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced evasion techniques. Despite efforts to…
IT leaders plan to spend more in 2025 compared to 2024, the Budget planning guides from analyst Forrester has reported. The report, based on a…
New attacks attributed to China-based cyber espionage group Mustang Panda show that the threat actor switched to new strategies and malware called FDMTP and PTSOCKET…
WhatsApp’s “View Once” feature, designed to enhance privacy by allowing users to send photos and videos that disappear after being opened once, has been found…
Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters. By leveraging trust and fear, respectively, these attacks…
Finding and acquiring the right data to build an enterprise dataset is perhaps the most critical task facing organisations that want to build their own…