Not too long ago, the role of chief information security officer was a purely technical position designed to help an organization overcome cybersecurity challenges....
This week's report that cyberattackers are laser-focused on crafting attacks specialized to bypass Microsoft's default security showcases an alarming evolution in phishing tactics, security...
Cybercriminals targeting the retail and hospitality industry are sticking to tried and tested threat vectors such as credential harvesting and phishing, according to analysis...
UPDATE
A Fortinet bug disclosed last week is now under active exploitation.Â
Fortinet on Friday warned that users of its FortGate firewall and FortiProxy Web proxies...
The LofyGang threat group is using more than 200 malicious NPM packages with thousands of installations to steal credit card data, and gaming and streaming accounts,...
Facebook is contacting about 1 million users of its platform about their account details potentially being compromised by malicious Android or iOS applications.In a...
AUSTIN, Texas, Oct. 6, 2022
/ PRNewswire/ — CyberRatings.org, the nonprofit entity dedicated to
providing transparency on cybersecurity product efficacy, will begin
testing Enterprise Firewalls and Data...
44CON -- London — After a two-year break, London's information security conference 44CON returned on Sept. 16-16, 2022. Passionate security evangelists were joined by...
The number of top universities and colleges across the US offering degrees in cybersecurity is now in the hundreds, and well-known college ranking services...
SECTOR 2022 -- Toronto — The first shots in the Russia-Ukraine cyberwar were fired virtually on Feb. 23, when destructive attacks were launched against...
The changing hybrid or fully remote work model has brought numerous cybersecurity vulnerabilities as companies have less insight into the way employees are working...