Advertisement
Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says
Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.
Microsoft's Defending Ukraine report offers fresh details on digital conflict and disinformation
Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."
Russia-China cybercriminal collaboration could “destabilize” international order
Russian cybercrime groups are courting their Chinese counterparts potentially could scale up the capabilities of both.
Advertisement
Adversarial machine learning explained: How attackers disrupt AI and ML systems
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.
How Visa fights fraud
The financial services company has made massive investments in data and analytics to better detect and prevent fraud.
Security startup Cerby debuts with platform to manage shadow IT
The Cerby system automates and streamlines the detection and protection of "unmanageable" applications, providing a platform that centralizes application enrollment, access and monitoring.
5 years after NotPetya: Lessons learned
NotPetya vastly broadened the scope of damage that malware attacks could do and forced CISOs and security researchers to rethink their approach.
The strange business of cybercrime
How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.
Mitek launches MiVIP platform to fight identity theft
The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.
Italian spyware firm is hacking into iOS and Android devices, Google says
RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.
Advertisement
5 social engineering assumptions that are wrong
Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.
Security startups to watch for 2022
Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.
Open-source software risks persist, according to new reports
Companies are still struggling to gain confidence in the security of their open-source projects, but shifting security earlier in the development process shows promise.
Kaseya closes $6.2 billion Datto deal, vows to cut prices
The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.
Cisco reports vulnerabilities in products including email and web manager
New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by FortinetMajor Retailer Converges Network and Security Systems With Fortinet Secure
-
Sponsored by Microsoft SecurityWhat Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine
-
Sponsored by CrowdStrikeSo You Want To Defend Your Cloud… Agentless or Agent-based, Which Approach Is