What Is a Crypto Wallet and How to Keep Your Wallet Secure?
A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you to join them in the...
US Critical Infrastructure Companies Will Have to Report When They Are Hacked
This will be law soon: Companies critical to U.S. national interests will now have to report when they’re hacked or they pay ransomware, according to...
Israeli Government Websites Taken Offline in Large-Scale Cyber-Attack
The widescale DDoS attack is suspected to have been conducted by a nation-state actor Read More
Top 10 Malware February 2022
In February 2022, Arechlient2, CryptoWall, and Delf. CryptoWall returned to the Top 10, while Arechclient2 and Delf made their first appearances. Read More
Traffic interception and MitM attacks among security risks of Russian TLS certs
Russia is offering its own Transport Layer Security (TLS) certificates to bypass sanctions imposed by Western companies and governments that are limiting citizens’ access to...
Mobile Devices See 466% Annual Increase in Zero-Day Attacks
Zimperium report warns of bugs, malware and misconfigurations Read More
Unpacking OMB’s federal strategy for implementing Zero Trust
This blog was written by an independent guest blogger. The US Office of Management and Budget (OMB) has released a strategy to help the federal...
Ukrainian Targets Hit by Another Destructive Malware Variant
CaddyWiper looks like nothing else, says ESET Read More
Post Title
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. GarageBand is an audio tool iOS...
7 old attack vectors cybercriminals still use
Even in today’s age of digital evolution, malicious hackers continue to use attack vectors dating back decades. Research shows notable periods of resurgence relating to...