Vulnerability in Stalkerware Apps
TechCrunch is reporting — but not describing in detail — a vulnerability in a series of stalkerware apps that exposes personal information of the victims....
Cybersecurity vendors respond to the Ukraine-Russia conflict
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyberattacks have been detected targeting Ukrainian businesses, websites and government...
How security vendors are aiding Ukraine
Since Russia launched a full-scale military invasion into Ukraine on February 23, a series of cyberattacks have been detected targeting Ukrainian businesses, websites and government...
How to manage privileged users in IT
This blog was written by an independent guest blogger. Privileged users are the key to the information system. The operation of information systems and the...
Ghostwriter Group Targets NATO Refugee Effort
Proofpoint warns of new phishing campaign from Belarusian state Read More
The Ukraine/Russia information war is forcing companies to choose a side
The Russian invasion of Ukraine has a very visible aspect as we see Ukrainians stand and fight the Russian military might. The geopolitical landscape is...
How blockchain investigations work
When Colonial Pipeline was hit by ransomware on May 7, 2021, it paid 75 bitcoins to restore its systems. But the money was not entirely...
Nvidia Admits Hackers Stole Employee and Internal Data
Attackers claim to have IP which could increase capacity for crypto-mining Read More
Apple and Google Turn Off Map Features to Help Ukraine
Tech giants also follow Meta in cracking down on Kremlin propaganda Read More
Conti Ransomware Group Diaries, Part I: Evasion
A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian...