Cyber Security

Can open-source software be secure?

Secure Coding, Business Security Or, is mass public meddling just opening the...

Introducing Sophos DNS Protection – Sophos News

We are excited to start the early access program (EAP) for Sophos DNS Protection for networks. This new cloud-based service is part of...

Hackers pose as officials to steal secrets and cryptocurrency for North Korea

A hacking gang has been accused of impersonating South Korean officials and journalists in a plot to steal cryptocurrency for the North Korean...

Welltok data breach exposes data of 8.5 million US patients

Healthcare SaaS provider Welltok is warning that a data breach exposed the personal data of nearly 8.5 million patients in the U.S. after...

N. Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

Nov 23, 2023NewsroomSoftware Supply Chain Attack A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate...

Fake Browser Updates Targeting Mac Systems With Infostealer

A widely popular social engineering campaign previously only targeting Windows systems has expanded and is now using fake browser updates to distribute Atomic...

5 of the most popular programming languages in cybersecurity

Secure Coding While far from all roles in security explicitly demand coding...

Microsoft Improves Windows Security with a Path to Move Off NTLM

NTLM is a simple and straightforward authentication method for connecting to applications on...

Latest articles