US Critical Infrastructure Companies Will Have to Report When They Are Hacked
This will be law soon: Companies critical to U.S. national interests will now have to report when they’re hacked or they pay ransomware, according to...
Israeli Government Websites Taken Offline in Large-Scale Cyber-Attack
The widescale DDoS attack is suspected to have been conducted by a nation-state actor Read More
Top 10 Malware February 2022
In February 2022, Arechlient2, CryptoWall, and Delf. CryptoWall returned to the Top 10, while Arechclient2 and Delf made their first appearances. Read More
Traffic interception and MitM attacks among security risks of Russian TLS certs
Russia is offering its own Transport Layer Security (TLS) certificates to bypass sanctions imposed by Western companies and governments that are limiting citizens’ access to...
Mobile Devices See 466% Annual Increase in Zero-Day Attacks
Zimperium report warns of bugs, malware and misconfigurations Read More
Unpacking OMB’s federal strategy for implementing Zero Trust
This blog was written by an independent guest blogger. The US Office of Management and Budget (OMB) has released a strategy to help the federal...
Ukrainian Targets Hit by Another Destructive Malware Variant
CaddyWiper looks like nothing else, says ESET Read More
Clearview AI Helping the Ukrainian War Effort
Facial recognition company lists multiple ways tech could be used by Kyiv Read More
Why you can’t trust AI-generated autocomplete code to be secure
When GitHub launched the code autocomplete tool Copilot in June 2021, many developers were in awe, saying it reads their minds and helps them write...
7 old attack vectors cybercriminals still use
Even in today’s age of digital evolution, malicious hackers continue to use attack vectors dating back decades. Research shows notable periods of resurgence relating to...