Cyber Security

How One Company Gauges Its Employees’ Cybersecurity ‘Fluency’

Professional services firm TAG.Global now requires that all of its employees complete a cybersecurity fluency assessment test as a way to raise awareness...

AWS, Microsoft 365 Accounts Under Active ‘Androxgh0st’ Attack

The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued an alert about a malware campaign targeting Apache webservers and...

‘Punchmade Dev’ Cybercrime Rapper Launches Cash-Scamming Web Shop

Punchmade Dev — a rapper, producer, and investor known for his music regarding cybercriminal activities — recently has been promoting his own online...

Experts Ponder Effectiveness of Official Warnings of Cyber Scams

The Dubai Police, from the United Arab Emirates, and the Cyber Security Authority of Ghana have already issued two warnings this year, thanks...

Google Chrome Zero-Day Bug Under Attack, Allows Code Injection

Google has patched a high-severity zero-day bug in its Chrome Web browser that attackers are actively exploiting. It paves the way for code...

$80M in Crypto Disappears Into Drainer-as-a-Service Malware Hell

A sophisticated phishing campaign dubbed "Inferno Drainer" has managed to siphon more than $80 million in cryptocurrency from 137,000 unwitting victims over the...

Lock Down the Software Supply Chain With ‘Secure by Design’

Software that prioritizes security at its most foundational level means designing it with customer security as a key goal rather than a tacked-on...

Why Data Loss Prevention is Important to Enterprise Defense

Data loss prevention (DLP) is an information security strategy that helps organizations prevent data breaches and protect sensitive information by monitoring and controlling...

‘Chaes’ Infostealer Code Contains Hidden Threat Hunter Love Notes

Appearing flattered by the dogged analysis of Chaes malware over the years, the infostealer's developer dropped secret messages in the latest version of...

Latest articles