The Ultimate Guide to Hiring a PR Agency in 2023

Vanessa Carlton said it best: Your company is making its way downtown, faces pass, and you’re…

The Complete Guide to Real Estate SEO

Think about the last time you were considering buying something. Your journey probably started in the…

How to Use XLookup in Excel

Working with large data sets is always tricky. Excel is one of the most powerful tools…

Industrial Giant ABB Confirms Ransomware Attack, Data Theft

Swiss industrial giant ABB confirmed this week that it was recently targeted in a ransomware attack…

Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation

A recently identified ransomware operation called Buhti is using LockBit and Babuk variants to target both…

Google Cloud Users Can Now Automate TLS Certificate Lifecycle

Google on Thursday announced the availability of its Automatic Certificate Management Environment (ACME) API for all…

Watch Now: Threat Detection and Incident Response Virtual Summit

All sessions from SecurityWeek’s Threat Detection & Incident Response Summit  are now available to watch on demand. This…

New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids

Mandiant on Thursday detailed a new piece of malware that appears to be linked to Russia…

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since…