News

Human risk is concentrated, not widespread: Just 10% of employees are responsible for nearly three-quarters (73%) of all risky behavior. Visibility is alarmingly low: Organizations relying solely on ...
CISA has mandated immediate mitigation for federal agencies, while analysts urge enterprises to accelerate cloud migration ...
The novel technique exploits the cross-device sign-in option on FIDO to create an authenticated session controlled by ...
Recent cyberattacks deploying the potent Authentic Antics malware tool to target Microsoft cloud accounts were the handiwork ...
With job postings for some cybersecurity positions already in decline, industry observers debate the extent to which AI is ...
In an era obsessed with AI threats and zero-day exploits, it is the age-old security slip-ups, forgotten scaffolding, brittle ...
Bad habits can be hard to break. Yet when it comes to security, an outdated practice is not only useless, but potentially ...
Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
Gathering threat intelligence, finding the perpetrators of cyber attacks and bringing down whole ransomware gangs are some of ...
The cybercriminal group has broadened its attack scope across several new industries, bringing valid credentials to bear on ...
The newly disclosed flaw affects a specific API that suffers from insufficient input validation to allow unauthenticated RCE ...
Three threat groups conduct sophisticated phishing attacks against chip manufacturers and financial analysts between March ...