Currently, the campaign has affected approximately 800 individuals and businesses globally, including 310 in the United States, with an ad…
The furry in which the automotive community pried, prodded, and eventually outsmarted existing functions that are software-driven is nothing short…
Jul 17, 2023THNEndpoint Security / Cyber Attack Cyber attacks using infected USB infection drives as an initial access vector have…
The NoName hacker group has started naming the websites of the New Zealand government as victims of their cyber attacks….
Directory, identity, and access management solutions provider JumpCloud has disclosed customer impact following a nation-state cyberattack. After resetting customer API…
By Zac Amos, Features Editor, ReHack Cybersecurity Maturity Model Certification (CMMC) is another compliance framework defense industrial base (DIB) contractors…
By Peter Warmka, Founder, Counterintelligence Institute Over the past few years, Cybersecurity professionals have acknowledged the increasing need of security…
A critical cross site scripting (XSS) vulnerability (CVE-2023-34192) in popular open source email collaboration suite Zimbra is being exploited by…
Jul 17, 2023The Hacker NewsAttack Surface Management The hype around different security categories can make it difficult to discern features…
The digital realm has undergone a dramatic transformation over the last decade. At the forefront of this evolution is Software…
Security researchers continue to issue alerts on a critical Cisco vulnerability that exposes configuration data to unauthorized access. Cisco Systems last…
SecurityWeek has cataloged 214 cybersecurity-related merger and acquisition (M&A) deals between January 1 and June 30, 2023. For comparison, there…