The state-sponsored cybersecurity threat group known as APT37 has been observed carrying out sophisticated reconnaissance activities against South Korean targets….
The social media giant marks its fifth anniversary of sharing insights into threat actors operating on Facebook and Instagram with…
The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the…
This week on the Lock and Code podcast… The US presidential election is upon the American public, and with it…
I have some interesting thoughts going into the big day tomorrow, and I wanted to try to capture them concisely….
The password problem — weak, reused credentials that are easy to compromise yet hard to remember and manage — plagues…
Password spraying is a type of brute force attack where an attacker attempts to access multiple user accounts by trying…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to distribute the SYS01 InfoStealer through…
A new phishing campaign dubbed ‘CRON#TRAP’ infects Windows with a Linux virtual machine that contains a built-in backdoor to give…
Figuring out SOC pricing doesn’t have to be overwhelming. I’ve been there—facing the question of “How much should we spend…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which allowed malicious actors to steal…
Hackers claim to have breached Nokia through a third-party contractor, allegedly stealing SSH keys, source code, and internal credentials. The…











