News
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware ...
The US government has begun an audit of its National Vulnerability Database (NVD) to ensure its team can catch up with the ...
A joint advisory from the US, UK, Australia and others highlights the importance of SIEM/SOAR platforms and overcoming ...
Cyber House Party has always been about creating an inclusive environment. There is no exclusive list, no badge scanning at ...
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data theft ...
This article explores external attack surface management and how it extends beyond traditional vulnerability management to give organizations a more complete view of their security gaps and vulnerabil ...
Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to ...
The US National Institute of Standards and Technology (NIST) published a white paper introducing a new metric called Likely ...
Cisco Talos reported that a Chinese group has deployed web shells and malware in local government networks post-exploitation ...
Microsoft has teamed up with law enforcement agencies across the globe to disrupt the infrastructure behind one of the ...
Cybersecurity firm PRODAFT attributed the attack to a threat actor known as Nefarious Mantis, part of the Interlock cluster.
A majority of Americans have grave concerns about providing biometric information online and two-fifths (39%) argue the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results