Krebs On Security
- In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second […]
- Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online […]
- Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel form of tap-to-pay fraud using […]
- A message posted on Monday to the homepage of the U.S. Cybersecurity & Infrastructure Security Agency (CISA) is the latest exhibit in the Trump administration's […]
- A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a […]
- Microsoft today issued more than 50 security updates for its various Windows operating systems, including fixes for a whopping six zero-day vulnerabilities that are already […]
Secure World
- Having a great cybersecurity idea is only half the battle. The real challenge? Getting others to embrace it. When security […]
- The Google Threat Intelligence team (GTIG) has published new research outlining how IT workers from the Democratic People's Republic of […]
- The latest wave of privacy litigation doesn't involve data breaches, AI models, or spyware. It involves tracking pixels—and legal theories […]
- Tax season is stressful enough; between paperwork, unexpected balances, and looming deadlines, most of us already have plenty on our […]
- Each year on March 31st, just before April Fool's Day, cybersecurity professionals, IT teams, and business leaders alike are reminded […]
- The pixel lawsuits aren't about pixels. They're about governance—or the lack of it.
Dark Reading
- Shifting to a RaaS business model has accelerated the group's growth, and targeting critical industries like healthcare, legal, and manufacturing […]
- Layoffs may cause short-term disruptions, but they don't represent a catastrophic loss of cybersecurity capability — because the true cyber […]
- Signal, Wickr, WhatsApp, and Cape all have different approaches to security and privacy, yet most are finding ways to make […]
- At least three major energy solution and renewable energy companies have nearly 50 vulnerabilities — many of them "basic" mistakes […]
- Beginning on May 5, the tech giant will enforce new email authentication protocols for Outlook users who send large volumes […]
- The vendor had originally assessed the flaw as low risk but now says it is a critical issue that enables […]