How to Prevent Corporate Data Leaks in the Cloud

Forget shadowy attackers deploying bespoke zero-day exploits from afar. A risk that is far more real for organizations as they

Read more

DDoS Attack Service Admin Behind 200,000 Attacks Face 35 Years in Prison

A federal jury in California, at the end of a nine-day trial, found an Illinois man guilty, who have operated

Read more

New Malware Uses Windows Subsystem for Linux for Stealthy Attacks

Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying

Read more

Cyber arms dealer exploits new iPhone software vulnerability

A cyber surveillance company based in Israel developed a tool to break into Apple iPhones with a never-before-seen technique that

Read more

North Korean Hacker Recently Employed Social Media to Launch a Cyberattack

North Korean hacking group Kumsong 121 has lately launched a series of cyberattacks that have taken advantage of social media

Read more

Hackers Shift from Malware to Credential Hijacking

Adversaries are relying less on malware to conduct attacks that are consequently more difficult to detect, according to an annual

Read more

Diversify ‘homogenous’ US cybersecurity workforce

A group of experts across multiple fields on Thursday recommended a sweeping set of actions to diversify the U.S. cybersecurity

Read more

CISA Warns of Actively Exploited Zoho ManageEngine ADSelfService Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday issued a bulletin warning of a zero-day flaw affecting Zoho

Read more

We cannot allow cyberattacks to be the new normal

Cybersecurity has been a decades-long “grey rhino” in the wings of this “black swan” event. Last year, a Tokopedia data

Read more