Online sellers are targeted in a new campaign to push the Vidar information-stealing malware, allowing threat actors to steal credentials…
A vulnerability that was only recently found and given the name “Migraine” is connected to macOS migration functionality and represents…
Code hidden inside PC motherboards left millions of machines vulnerable to malicious updates, researchers revealed this week. Staff at security firm…
Google Drive is one of the most used cloud-based storage platforms, and due to its immense popularity and capabilities, it’s…
When Aparna Pappu, vice president and general manager of Google Workspace, spoke at Google I/O on May 10, she laid…
Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide. Splunk can collect logs of…
Jun 03, 2023Ravie LakshmananPrivacy / Technology The U.S. Federal Trade Commission (FTC) has fined Amazon a cumulative $30.8 million over…
It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is…
A survey of global cybersecurity leaders through the 2023 Certified CISO Hall of Fame Report commissioned by the EC-Council identified…
Jun 03, 2023Ravie LakshmananEndpoint Security / Linux An analysis of the Linux variant of a new ransomware strain called BlackSuit…
The Federal Bureau of Investigation (FBI) and its partners have uncovered an ongoing and resolute intelligence-gathering and espionage operation carried…
Billtrust, a prominent player in the B2B accounts receivable automation and digital payments market, has announced the appointment of Ankur…










