The number of digital transactions has skyrocketed. As consumers continue to spend and interact online, they have growing expectations for…
A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to…
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the…
Sep 15, 2023THNCyber Attack / Password Security Iranian nation-state actors have been conducting password spray attacks against thousands of organizations…
The iPhone of Galina Timchenko, the co-founder, CEO, and publisher of the Russian independent media outlet Meduza, was found to have…
64% of IT leaders believe that cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech, according…
The once far-off vision of remotely updating software without needing to bring it into a service center was initially designed…
Has the launch of the iPhone 15 triggered a yearning to upgrade to a new model? Here are some tips…
An affiliate of the BlackCat ransomware group, also known as APLHV, is behind the attack that disrupted MGM Resorts’ operations, forcing…
We caught a nasty phish yesterday, likely looking to feed on victims of last year’s LastPass breach. The consequences of…
Researchers have discovered a new vulnerability in Github that might allow an attacker to take advantage of a race situation…
Dive into where we prevented more than the rest and how we were able to do it. MRG Effitas, a…