Webrat turns GitHub PoCs into a malware trap
Security professionals hunting PoCs and exploit code on GitHub might soon walk into a trap, as […]
Step-by-Step Guide to Implementing 72-Hour Breach Reporting
The global acceleration of privacy regulation DPDP Act, GDPR, DIFC DP Law, PDPL (UAE), and evolving […]
Implementing NIS2 — without getting bogged down in red tape
NIS2 is symbolic of the core problem with European directives and regulations: They generate unnecessary red tape […]
ServiceNow’s $7.75 billion cash deal for Armis illustrates shifting strategies
ServiceNow has agreed to buy cybersecurity vendor Armis for $7.75 billion in cash, it announced Tuesday. […]
Interpol sweep takes down cybercrooks in 19 countries
A ransomware expert lauded a recent crackdown on cybercrooks in Africa that resulted in the decryption […]
MacSync Stealer malware bypasses macOS Gatekeeper security warnings
The MacSync Stealer macOS malware can now infect victims’ computers using what appears to be a […]
Amazon has stopped 1,800 job applications from North Korean agents
Amazon’s chief security officer Stephen Schmidt writes that since April 2024, the company has stopped over […]
French postal service brought down by cyber attack
France’s postal service, La Poste, has been largely down for over twelve hours following a widespread […]
One-time codes used to hack corporate accounts
Security firm Proofpoint has discovered that hackers have found a clever way to bypass multi-factor authentication […]
Why outsourced cyber defenses create systemic risks
Outsourcing critical IT and cybersecurity once looked like a shortcut to efficiency. Today, it is a […]