Mandiant on Thursday detailed a new piece of malware that appears to be linked to Russia…
New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…
AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since…
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is…
Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a…
Barracuda Discloses Breach Of Some Email Security Customers Due To Zero-Day Vulnerability
Barracuda said that some Email Security Gateway customers were impacted by a breach last week that…
Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance
According to a research report by security vendor Qualys, on average, a software vulnerability in 2022…
TCS Expands Google Cloud Relationship With Vertex Generative AI
‘What is really special is the fact that we are bringing the best from Google and…
Claroty Unveils MSSP Partnerships with IBM, Rockwell Automation, NTT Data, eSentire, and More
– Claroty, the cyber-physical systems protection company, today announced the global expansion of its FOCUS Partner Program…
Prevalent Expands Industry-Leading Third-Party Risk Management Platform; Delivering First Solution that Addresses Compliance, Security and Supply Chain Risks
Prevalent, Inc., the company that takes the pain out of third-party risk management (TPRM), today announced the latest…