A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS...
Mois : avril 2023
Many routers that are offered for resale contain sensitive corporate information and allow third-party connections to corporate...
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North...
The medical imaging firm’s systems were compromised by a threat actor, exposing patients’ driver’s licenses and other...
An uptick in EvilExtractor activity aims to compromise endpoints to steal browser from targets across Europe and...
Kim Jong Un’s Swiss Army knife APT continues to spread its tendrils around the world, showing it’s...
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at...
While Intel is building more hardware protections directly into the chips, enterprises still need a strategy for...
Google has addressed a Cloud Platform (GCP) security vulnerability impacting all users and allowing attackers to backdoor...
Software written or acquired outside of IT’s purview is software that IT can’t evaluate for security or...