New Case Study: The Malicious Comment

When is a ‘Thank you’ not a ‘Thank you’? When it’s a sneaky bit of code…

2024 Cloud Security Awards Winners Announced

The 2024 Cloud Security Awards program, operated by technology awards body The Cloud Awards, has crowned its winners, featuring…

Personable Inc. to Host 2024 AI Summit Focused on Addressing Financial Fraud

Financial fraud continues to pose significant threats to the public, and the importance of innovative solutions cannot be…

US Charges Creator Of LockBit, The World’s ‘Most Prolific’ Ransomware Group

The U.S. Justice Department is charging a Russian national for his alleged role as the creator,…

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities…

UnitedHealth: Compromised Citrix Credentials Behind Change Healthcare Hack

UnitedHealth Group disclosed that hackers broke into Change Healthcare IT systems in February using stolen credentials,…

CloudScale365 Partners with Stratus ip to Offer CIRRUS Cybersecurity Solutions

CloudScale365, a leading provider of state-of-the-art managed IT services, announced an expanded strategic relationship with longtime…

ESET Adds New Rebates and Benefits to 2024 Partner Connect Program

 ESET, a global leader in digital security, today announced its updated partner program with new benefits…

Ransomware Group Starts Leaking Data Allegedly Stolen From Change Healthcare

The RansomHub ransomware group has started publishing data allegedly stolen from healthcare transactions processor Change Healthcare…

5 Things To Know About The Latest Firewall, VPN Attacks

Hackers continue to escalate their targeting of network security devices and remote access services as a…