- Welcome Guest
- Sign In
Researchers reveal a novel security risk as hackers exploit generative AI's 'hallucinations' to deliver malicious code into a company's development environment, posing a growing threat to enterprise security
The U.S. Department of Justice has another feather in its cyberwarfare cap after taking down the cybercrime network of Turla, a criminal gang linked to Russia called one of the world's most sophisticated cyber-espionage groups
Like a persistent piece of malware that your antivirus product just can't seem to eradicate, the annual RSA cybersecurity conference was back with a vengeance this year. But while the malware example is inherently malicious, the industry event seemed to be bustling with goodwill and a positive messa...
New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack
The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices
Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services
Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity
2023 might be a volatile year for cybersecurity officers as they deal with the pressures of maintaining a ridged security posture while also dodging the bullet of blame when attacks are successful
While Linux malware reached never-before-seen numbers in 2022, the total number of new malware developments among other major computing platforms fell
Distributed denial-of-service attacks continued to rise in November. A prime target was the United States, with 1,543 attacks. While "as a service" offerings have made ransomware a low-effort, low-risk option for generating criminal gains
Defenders of software supply chains have a new attack vector to worry about: machine learning models
Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices
Compromised credentials provide an easy way for threat actors to get their hands on valuable data possessed by governments. Phishing attacks on civil servants jumped 30% from 2020 to 2021, with one out of every eight workers exposed to phishing threats during the period
A large-scale phishing attack built on typosquatting is targeting Windows and Android users with malware. The campaign currently underway uses more than 200 typosquatting domains that impersonate 27 brands to trick web surfers into downloading malicious software to their computers and phones.