Krebs On Security
- A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency (DOGE) siphoned gigabytes of […]
- A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency (DOGE) transferred gigabytes of sensitive […]
- A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking […]
- President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA) who was fired by […]
- China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the […]
- Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being […]
Secure World
- Crafting credible lures at scale required either a team of grifters or a scattergun approach. Today, those constraints have been […]
- In its 17th edition, Verizon's 2025 Data Breach Investigations Report (DBIR) continues to deliver one of the most comprehensive analyses […]
- The United States Cybersecurity and Infrastructure Security Agency (CISA) is confronting a pivotal moment following the recent resignations of two […]
- The state of data security is in flux—and according to Rubrik's recent report, it's not trending in the right direction. […]
- A sophisticated cybercrime campaign, dubbed Elusive Comet, has been uncovered, in which North Korean threat actors are exploiting Zoom's remote […]
- You've built your cybersecurity business on years of solid technical expertise. Your team has a deep understanding of all the […]
Dark Reading
- CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it.
- Attackers are leveraging the benefits of new technology and the availability of commodity tools, credentials, and other resources to develop […]
- Security teams are under more pressure than ever — and cybersecurity debt is adding fuel to the fire. While it […]
- The Department of Justice announced compliance rules for the Data Security Program that will require organizations to reexamine how they […]
- An analysis of more than a half-million mobile apps find encryption problems, privacy issues, and known vulnerabilities in third-party code. […]
- By focusing on prevention, education, and risk transfer through insurance, organizations — especially SMEs — can protect themselves from the […]