5 Types of Crypto You Didn’t Know Existed
When you think of cryptocurrency, what springs to mind for you? For a lot of us, cryptocurrency conjures up images of Bitcoin and Ether, which…
When you think of cryptocurrency, what springs to mind for you? For a lot of us, cryptocurrency conjures up images of Bitcoin and Ether, which…
19 Mar “Starring Jerry As Himself” (Film): An Inside Look By Cybercrime Magazine This week in cybersecurity from the editors at Cybercrime Magazine –Watch the…
Whether the cause is insurmountable technical debt, lack of funds, a third reason or all of them, NIST’s National Vulnerability Database (NVD) is struggling, and…
A 42-year-old manager at an unnamed telecommunications company has admitted SIM swapping customers at his store. SIM swapping, also known as SIM jacking, is the…
Mar 19, 2024NewsroomLinux / Cyber Espionage A new variant of a data wiping malware called AcidRain has been detected in the wild that’s specifically designed…
The cyber security function isn’t a back office team that is never seen and never heard. To truly protect the company, cyber security touches every…
The Cybersecurity and Infrastructure Security Agency (CISA) has taken a significant step towards fortifying the cybersecurity of federal systems with the announcement of the Repository…
The US Defense Logistics Agency (DLA) reportedly experienced a data breach, allegedly attributed to the Russian Evilics Group, as disclosed by the threat actor on…
A proof of Concept (PoC) has been published for a critical Remote Code Execution (RCE) vulnerability identified in Fortra’s FileCatalyst software. This vulnerability, tracked as…
A renowned software documentation platform has confirmed a security breach that led to the unauthorized access of 91 GitHub tokens. This incident has raised alarms…
NHS Dumfries and Galloway suffered a cyberattack, potentially compromising patient data. The health board is working with authorities. Learn more about the attack, its potential…
Verimatrix released its new Verimatrix Counterspy anti-piracy solution. Counterspy leverages technology first developed by the company’s cybersecurity team back in 2021 to offer an innovative…