News
Adidas revealed that customer contact information, including names, emails and phone numbers were accessed by an unauthorized ...
A newly-discovered Russian group, Void Blizzard, has successfully compromised organizations in critical industries, Microsoft ...
A targeted cyber-attack on an MSP exploited flaws in remote management tools, resulting in ransomware deployment and data ...
A novel attack exploited machine learning models on PyPI, using zipped Pickle files to deliver infostealer malware ...
Cyber House Party has always been about creating an inclusive environment. There is no exclusive list, no badge scanning at ...
The US government has begun an audit of its National Vulnerability Database (NVD) to ensure its team can catch up with the ...
A joint advisory from the US, UK, Australia and others highlights the importance of SIEM/SOAR platforms and overcoming ...
Cisco Talos reported that a Chinese group has deployed web shells and malware in local government networks post-exploitation ...
This article explores external attack surface management and how it extends beyond traditional vulnerability management to give organizations a more complete view of their security gaps and vulnerabil ...
The US National Institute of Standards and Technology (NIST) published a white paper introducing a new metric called Likely ...
Google's Daniel Kapellmann Zafra discusses the growth of a new set of hacktivist groups, and the threat they pose to ...
Cybersecurity firm PRODAFT attributed the attack to a threat actor known as Nefarious Mantis, part of the Interlock cluster.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results