High Stakes, Hidden Costs: Examining the Fallout of the U.S. Disbanding Its Public-Private Cyber Alliances

High Stakes, Hidden Costs: Examining the Fallout of the U.S. Disbanding Its Public-Private Cyber Alliances
[ad_1] By Matthew DeChant, CEO of Security Counsel In late January, two days into the new administration, the Department of ...
Read more

Insight Partners, VC Giant, Falls to Social Engineering

Insight Partners, VC Giant, Falls to Social Engineering
[ad_1] NEWS BRIEF Insight Partners, the venture capital fund that has investments in multiple cybersecurity firms, has confirmed a data ...
Read more

Zero Trust Architecture a priority to President Donald Trump

Zero Trust Architecture a priority to President Donald Trump
[ad_1] Nearly six months ago, the Western media began to highlight growing concerns about potential Chinese interference in critical U.S. ...
Read more

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms
[ad_1] North Korea-linked threat groups are increasingly using living-off-the-land (LotL) techniques and trusted services to evade detection, with a recent ...
Read more

How to thwart cyber attacks on connected cars

How to thwart cyber attacks on connected cars
[ad_1] The rise of connected cars, equipped with internet connectivity, advanced sensors, and integrated technologies, has revolutionized the automotive industry, ...
Read more

New Variant of macOS Threat XCSSET Spotted in the Wild

New Variant of macOS Threat XCSSET Spotted in the Wild
[ad_1] Attackers are wielding a new variant of one of the biggest threats to the macOS platform, malware called XCSSET, ...
Read more

The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)

The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)
[ad_1] In recent years, cyber crime has evolved into a highly sophisticated and organized business model. One of the most ...
Read more

CyberArk Makes Identity Security Play With Zilla Acquisition

CyberArk Makes Identity Security Play With Zilla Acquisition
[ad_1] CyberArk has acquired Boston-based startup Zilla as part of its plans to add identity governance and administration (IGA) capabilities ...
Read more

Akira Ransomware is now targeting legacy servers of defunct companies

Akira Ransomware is now targeting legacy servers of defunct companies
[ad_1] In a disturbing yet intriguing development, cyber criminals have once again demonstrated their capacity to target organizations with the ...
Read more

Tunnel of Love Leads to Scams

Tunnel of Love Leads to Scams
[ad_1] NEWS BRIEF In what appears to be the more sinister side of romance, the amount of money individuals lost ...
Read more