COMMENTARYThe saying "put yourselves in the shoes of a hacker" has long been part of defensive security strategies. Today, in the fast-paced and evolving...
The firm behind the leading USD-pegged stablecoin is releasing the results of a recent security audit.
According to a new blog post from Tether, the firm behind...
Attackers are targeting Apple iPhone users with a rash of MFA bombing attacks that use a relentless series of legitimate password-reset notification alerts in...
Sixteen advanced persistent threat (APT) groups targeted organizations in the Middle East over the past two years with cyberattacks focused on government agencies, manufacturing...
Highlights:
NTT's IOWN APN technology and Olympus' advanced technology for endoscopes will be utilized in a demonstration experiment of a cloud endoscopy system that enables...
The Australian government is carving out plans to revamp cybersecurity laws and regulations in the wake of a series of damaging high-profile data breaches...
A dramatic increase in online disinformation attacks against African nations and international agencies operating on the continent has information security and cybersecurity specialists scrambling...
COMMENTARYMitigating third-party risk may seem daunting when considering the slew of incoming regulations coupled with the increasingly advanced tactics of cybercriminals. However, most organizations...