News

Cybercriminals continue to sneak malicious repositories onto GitHub. Typosquatting, dependency confusion, and other types of cyberattacks precipitated through malicious packages are old and common ...
At least two journalists had their iOS devices compromised in recent months as a result of commercial spyware, according to research published this past week. The Citizen Lab, a research laboratory at ...
As they trade missile strikes, Iran and Israel have also faced heavy waves of cyberattacks this past week. On June 13, Israel initiated a military offensive it called "Operation Rising Lion," aimed at ...
Not long ago, the role of the chief information security officer (CISO) was well-defined: protect infrastructure, secure ...
Financially troubled Indian car-sharing firm Zoomcar Holdings suffered a data breach last week, after "an unauthorized third ...
The GodFather Android banking Trojan has evolved significantly, with an advanced on-device virtualization technique targeting financial institutions in Turkey, which allows it to hijack legitimate ...
The stigma surrounding burnout among security staffers may be fading, but organizations need to continue expanding the conversations about managing a fast-moving list of stressors. From CISOs to new ...
Earlier this week, OpenAI launched OpenAI for Government, which will provide AI technology for US public servants. The tech giant's existing collaborations with the US National Labs, the Air Force ...
Attackers are increasingly employing advanced tactics to evade anti-beaconing defenses, and enterprise security teams are constantly updating their methods to detect beaconing attacks before the ...
The threat associated with a critical decade-old remote code execution vulnerability in Roundcube webmail has increased sharply in recent days, with proof-of-concept (PoC) code for the bug becoming ...
Organizations in India want to adopt AI to modernize their approach to security operations, but are hampered by the need to deal with a quickly growing attack surface, a scarcity of workers with ...
Although cybersecurity is the core of their role, chief information security officers (CISOs) must also be business leaders. They support business objectives and goals by providing the most secure ...