
Leaked LockBit chats reveal how professional ransomware group operates
A major data leak has exposed the inner workings of the notorious ransomware group LockBit. The leak contains...
A major data leak has exposed the inner workings of the notorious ransomware group LockBit. The leak contains...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Tens of thousands of Docker Hub container images contain sensitive data such as private keys and API secrets ...
Google Play is going to make uploading malicious apps to its app store more difficult starting Aug. 31. Devel...
The WordPress security plugin All-In-One Security (AIOS) created a security flaw of its own accord. Because o...
Developer platform GitHub now supports passwordless authentication in a public beta form. This allows users t...
Researchers at Black Lotus Labs have tracked down a malware variant that has been flying under the radar for ...
Among Microsoft's cloud computing services are detection tools that could have detected the Chinese email hac...
Cisco is set to acquire Identity Threat Detection and Response (ITDR) startup Oort. Its technology will be ad...
Research team Mandiant has seen that attacks via USB malware have experienced a threefold growth. These attac...
Microsoft revealed this week that Chinese hackers were conducting spying operations on U.S. organizations. Th...
Hackers use open-source software to sneak in Windows malware and bypass Microsoft's driver restrictions. In a...