kicad-6.0.2-1.fc35
FEDORA-2022-78b18981a6 Packages in this update: kicad-6.0.2-1.fc35 Update description: Update to 6.0.2 Read More
Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict
The Russian invasion of Ukraine represents a new type of warfare, including extensive cyber and information operations Read More
Rash of hacktivism incidents accompany Russia’s invasion of Ukraine
In keeping with the hybrid nature of Russia’s invasion of Ukraine, several hacktivist groups and hackers have joined the fight in the embattled nation, including...
Decrypting Hive Ransomware Data
Nice piece of research: Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in...
Why client-side web application security is critical to protecting from Magecart and other similar attacks
What can’t you buy on the internet? Last-minute birthday gifts. Check. A new refrigerator. Check. An engagement ring. Check. Groceries. Check. Travel to foreign lands....
7 mistakes CISOs make when presenting to the board
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. This gives security leaders an opportunity to help senior business stakeholders...
12 risk-based authentication tools compared
Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and...
Conti Encrypts Karma Ransom Note in Same Victim Network
Two groups attacked same healthcare organization Read More
Euro Police Bust Gang Linked to Migrant Smugglers
Group was involved in disseminating counterfeit IDs, says Europol Read More
Toyota Halts Production Across Japan After Ransomware Attack
Outage hit key supplier, forcing carmaker to pull the plug Read More