The scope, scale, and evolving tactics of North Korean IT workers infiltrating western organizations continues to…
Category: Prime
Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware
The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to…
Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience
Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and…
New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones
Academic researchers have disclosed the details of two new CPU side-channel attacks impacting millions of phones,…
Smiths Group Scrambling to Restore Systems Following Cyberattack
British engineering giant Smiths Group is scrambling to restore systems that were knocked offline in response…
Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products
Rockwell Automation on Tuesday published six new security advisories to inform customers about several critical- and…
Cato Networks Hires Security Vet Karl Soderlund As New Channel Chief
Cato Networks has hired a veteran of the cybersecurity channel, Karl Soderlund, as its new global…
Treasury Levels Sanctions Tied to a Massive Hack of Telecom Companies and Breach of Its Own Network
The Treasury Department announced sanctions Friday in connection with a massive Chinese hack of American telecommunications…
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National…
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like,…