To secure enterprise assets in the cloud, CISOs must address several challenges previously unseen in traditional IT and on-premises data centers....
Category: Attack
May 03, 2023Ravie LakshmananPassword Security / Authentication Almost five months after Google added support for passkeys to its Chrome browse...
May 03, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industr...
May 02, 2023Ravie LakshmananMalvertising / Cyber Threat In yet another instance of how threat actors are abusing Google Ads to serve malware, ...
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sen...
May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation ...
May 02, 2023Ravie LakshmananMobile Security / Spyware A new Android surveillanceware possibly used by the Iranian government has been used to ...
May 02, 2023Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaw...
May 01, 2023Ravie LakshmananMalverposting / Scam A Vietnamese threat actor has been attributed as behind a "malverposting" campaign on social ...
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercr...