New Android Banking Malware ‘ToxicPanda’ Targets Users with Fraudulent Money Transfers

Over 1,500 Android devices have been infected by a new strain of Android banking malware called…

Leveraging Wazuh for Zero Trust security

Zero Trust security changes how organizations handle security by doing away with implicit trust while continuously…

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack

Cisco on Wednesday said it has released updates to address an actively exploited security flaw in…

Fortinet: ‘Critical’ FortiManager Vulnerability Is Seeing Exploitation

Fortinet disclosed Wednesday that a critical-severity vulnerability affecting numerous versions of FortiManager has seen exploitation in…

The Ultimate DSPM Guide: Webinar on Building a Strong Data Security Posture

Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some…

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign…

Graylog Redefines SIEM with More Efficient and Effective Threat Detection

These enhancements, and many others in the Fall 2024 release, help organizations realign their time and…

ESET Distributor’s Systems Abused to Deliver Wiper Malware 

ESET has launched an investigation after the systems of its official product distributor in Israel were…

Microsoft: ‘Relentless’ Russia-Sponsored Hacking Group Has Been Disrupted

Microsoft disclosed details Thursday about a recent effort to disrupt the activities of a “relentless” Russia-linked…

Collapse of National Security Elites’ Cyber Firm Leaves Bitter Wake

The future was once dazzling for IronNet. Founded by a former director of the National Security…