
NIST Requests Comments on Draft NISTIR 8221, “A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks” NIST has…

You wake up feeling toasty warm on a somewhat dreary and rainy day and you start to think about what…

Xbash has ransomware and coinmining capabilities. It also has self-propagating capabilities (meaning it has worm-like characteristics similar to WannaCry or…

The number of vulnerabilities reported in 2018 is 21% higher than last year, and total bug bounty payouts has increased…

We are pleased to announce that NIST Cybersecurity Practice Guide, SP 1800-5, IT Asset Management: Financial Services is now final. What’s…

Recent research by Palo Alto Networks Unit 42 Email Link Analysis (ELINK) has revealed that between April – June 2018,…

Those who share or threaten to share intimate images of Australians without their consent may now face civil and criminal…

Cyberattackers are expanding their attack vectors to steal money, gain access to corporate and employee data Mimecast has announced the availability…

Bitdefender Investigates Advanced Cyberattacks on Financial Institutions, Warns That Hackers Target Eastern European and Russian Banks Bitdefender has recently investigated…

Specialist cyber underwriting agency Emergence Insurance has upgraded its policy wording to expand coverage. The innovative new wording, released on…