Krebs On Security
- Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising […]
- Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws […]
- Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study […]
- The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved […]
- Authorities in Pakistan have arrested 21 individuals accused of operating "Heartsender," a once popular spam and malware dissemination service that operated for more than a […]
- The U.S. government today unsealed criminal charges against 16 individuals accused of operating and selling DanaBot, a prolific strain of information-stealing malware that has been […]
Secure World
- In a significant strike against one of the world's most active data leak marketplaces, French law enforcement has arrested five […]
- This paper is a companion to our initial paper, From Principles to Relationships: Redesigning Ethics for AI's Alien Cognition, about […]
- As connected healthcare devices become more pervasive and critical to patient outcomes, the cyber risks tied to their design, production, […]
- The U.S. Department of Homeland Security (DHS) issued a new National Terrorism Advisory System (NTAS) bulletin on June 22nd, warning […]
- You're at a café, waiting for your coffee. Instead of a physical menu, there's a QR code on the table. […]
- As kinetic conflict continues to unfold between Israel and Iran, a parallel battle is raging in cyberspace—one that is disrupting […]
Dark Reading
- Apple and Google espouse strong values about data privacy, but they allow programs from a Big Brother state to thrive […]
- If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, […]
- In a recent intrusion, the notorious cybercriminal collective accessed CyberArk vaults and obtained more 1,400 secrets, subverted Azure, VMware, and […]
- Hackers can spy on tens of thousands of connected tractors in the latest IoT threat, and brick them too, thanks […]
- Putting a vulnerability debt figure together involves work, but having vulnerability debt figures lets you measure real-world values against your […]
- Cyber operations have become critical to national security, but the United States has fallen behind in one significant area — […]