A ransomware cyber attack targeted Synnovis, a pathology laboratory that processes blood tests for several NHS organizations, primarily in southeast…
17 Jun Help Wanted: Women In Cybersecurity Posted at 08:55h in Blogs by Di Freeze This week in cybersecurity from…
Attackers are increasingly using a clever social engineering technique to get users to install malware, Proofpoint researchers are warning. The…
By Milica D. Djekic The progress distribution is a slow and time-consuming process that normally might take decades and sometimes…
Jun 17, 2024NewsroomCyber Espionage / Vulnerability A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack…
Traditional incident response (IR) processes, honed for on-premises environments, face significant challenges when applied to the cloud. The shared responsibility…
Cybersecurity researcher Jeremiah Fowler discovered a non-password-protected database containing 474,651 images belonging to Total Fitness, a health club chain with…
A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting…
By Dan K. Anderson vCISO and On-Call Roving Reporter, Cyber Defense Magazine In my travels and works one of the…
Traditional application security practices are not effective in the modern DevOps world. When security scans are run only at the…
The post-Cold War paradigm of globalisation came to a violent end in February 2022 with Russia’s full invasion of Ukraine,…
A new wave of cyberattacks targeting Android users in the Middle East has surfaced, with a focus on both Palestine…











