EvilVideo exploit in Telegram for Android lets attackers send malware disguised as videos. ESET discovered this zero-day vulnerability, prompting Telegram…
22 Jul Stellar Cyber July Here are four reasons why an on-premises deployment might be the right choice for your…
The Los Angeles County Superior Court – the largest superior court system in the U.S. – has been shut down…
The US government has imposed sanctions on two Russian cybercriminals for cyberattacks targeting critical infrastructure. According to a US Treasury press…
Once upon a time, I.T. security teams depended on hodgepodges of different cybersecurity solutions from various vendors. However, these multivendor…
Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines….
GraphQL, a flexible and efficient query language for APIs, is seeing rapid adoption across enterprises. A recent report titled “The…
Unmasking Vigorish Viper: The Elusive Cybercrime Network Behind Illegal Gambling. Learn how this sophisticated group uses clever DNS tactics and…
A graphical user interface (GUI) is the way many people interact with computing devices, ranging from smartphones and smart TVs,…
The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations…
Threat actors leverage social media to deploy malware, such as the SYS01 stealer, which steals Facebook credentials and spreads through…
As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates multiple disciplines, from research…











