Chief information security officers (CISOs) are still failing to get the support they want and need from their boardrooms, with…
In a string of ransomware attacks, the United States-based Pembina County Memorial Hospital was listed as victim by a cybercriminal…
Maintaining the security of the digital assets within the Defense Industrial Base (DIB) contractor networks helps defend the United States…
The Mirai malware botnet is actively exploiting a TP-Link Archer A21 (AX1800) WiFi router vulnerability tracked as CVE-2023-1389 to incorporate…
An unauthenticated RCE flaw (CVE-2023-27350) in widely-used PaperCut MF and NG print management software is being exploited by attackers to…
A financially-motivated North Korean threat actor is suspected to be behind a new Apple macOS malware strain called RustBucket. “[RustBucket]…
Amazon Web Services (AWS) is coming under pressure to provide easier access to more detailed data about its greenhouse gas…
TL;DR: On January 7, the Detectify security research team found that the .cd top-level domain (TLD) was about to be released for…
Google has made available a new tool for Google Workspace admins and security teams to make an assessment of the…
Lloyds Banking Group has joined the Banking Industry Architecture Network (Bian), which will see the UK giant contribute its expertise…
One of the most challenging parts of finishing a post is coming up with a good image. The AI art…
Cyberattackers leveraged more than 500 unique tools and tactics in 2022, according to Sophos. The data, analyzed from more than…