Palo Alto Networks threat intelligence team, Unit 42 has released new research about the cybercriminal Reaper group, suspected by a…
Call it alert fatigue. Call it information overload. Call it mind-killing and soul-destroying. The sheer number of alerts coming into…
ESET researchers have discovered a cyberattack that uses a Unified Extensible Firmware Interface (UEFI) rootkit to establish a presence on…
McAfee Researchers Analyse Cryptomining Malware Trend, Windows 10 Cortana Vulnerabilities, Blockchain Attack Vectors, Mobile Billing Fraud Apps, and the Weaponisation…
The proliferation of wireless and bring your own device (BYOD) endpoints means corporate networks depend more on wireless networks. Securing…
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…
You wake up feeling toasty warm on a somewhat dreary and rainy day and you start to think about what…
Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…
The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…
We are pleased to announce that NIST Cybersecurity Practice Guide, SP 1800-5, IT Asset Management: Financial Services is now final. What’s…