A global stop-payment mechanism developed by Interpol has enabled the disruption of an international business email scam. Learn more about the mechanism and...
One of summer’s top information security #sale_prominent #sale_bottom a text-decoration: none; Black Hat 2024, ended on August 8. The event comes at a...
Hackers targeted Mobile Guardian, a UK-based mobile device management (MDM) firm, and remotely wiped around 13,000 devices. Learn more about the threat and its...
The Grand Palais Réunion des musées nationaux, a major cultural venue in Paris and a host to numerous Olympic events, suffered a cyberattack over the...
Microsoft’s defense response to a distributed denial-of-service (DDoS) attack resulted in service outages that impacted customers worldwide. Learn more...
Researchers at Salt Security have found that manipulating the OAuth standard and cross-site scripting (XSS) flaws allows attackers to expose sensitive data and...
A grand jury in Kansas City has indicted Rim Jong Hyok, a North Korean intelligence operative who allegedly used ransomware to attack critical systems in the...
Network admins use access control lists (ACLs) to define permissions associated with network traffic and control security and performance. In this article,...
Mimecast, a human risk management platform and cybersecurity provider, has announced the acquisition of Code42, a company specializing in insider risk...