Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today’s dynamic IT environment demands an advanced vulnerability...
Evidence suggests that a just-discovered APT has been active since 2013.
Researchers have identified a small yet potent China-linked APT that has flown under the...
Analysts have uncovered an Iran-linked APT sending malicious emails to top Israeli government officials.
An advanced persistent threat group, with ties to Iran, is believed...
Ryan Witt, Proofpoint’s Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.
In the last two years, COVID-19 has occupied healthcare...
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.
Researchers are warning a post-COVID upsurge...
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders...
Attackers gained access to private account details through an email compromise incident that occurred in April.
Kaiser Permanente suffered a data breach due to email...
Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit functionality and install a backdoor for remote access.
A new...
Researchers demonstrated a possible way to track individuals via Bluetooth signals.
Researchers warn Bluetooth signals can be used to track device owners via a unique...
Environmentalists and policymakers warn water treatment plants are ripe for attack.
Industrial controls governing water-related U.S. critical infrastructure are woefully under-estimated as cyberattack targets. The...
The dangerous malware appears to be well and truly back in action, sporting new variants and security-dodging behaviors in a wave of recent phishing...