Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against ...
A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to ...
Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the ...
Unlike previous versions of PJobRAT, which included WhatsApp message-stealing functionality, the latest iteration has shifted ...
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials ...
The UK’s National Cyber Security Centre (NCSC) has published new guidance designed to minimize malicious domain registrations ...
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass ...
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user ...
The ICO’s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect ...
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to ...
British law enforcers are making some inroads into the problem. Last week they announced 422 arrests, the seizure of £7.5m in ...
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling ...