A grand jury in Kansas City has indicted Rim Jong Hyok, a North Korean intelligence operative who allegedly used ransomware to attack critical systems in the...
Network admins use access control lists (ACLs) to define permissions associated with network traffic and control security and performance. In this article,...
Mimecast, a human risk management platform and cybersecurity provider, has announced the acquisition of Code42, a company specializing in insider risk...
Cyber security researchers discovered risks in GitHub’s workflows and deleted data, in addition to the distribution of malware through accounts. Learn...
Google has redesigned Chrome to include malware detection in even password-protected executable files. Find out more about the development and why it matters...
The recent CrowdStrike and Microsoft outage impacted millions of devices globally. Both companies have now released official guidance and tools to fix the...
Authorities in the UK have arrested a 17-year-old for his alleged connections to the cybercrime group Scattered Spider. Find out more about the development and...
Acceptable Use Policies (AUPs) are rules for using company technology and data responsibly and safely. In this article, learn more about what they are, the key...
A faulty update by CrowdStrike created a massive worldwide outage across Microsoft Windows systems. Thousands of people and businesses witnessed system crashes...
Russian antivirus provider Kaspersky Lab has announced plans to leave the US market owing to the Biden administration’s ban on the sales and distribution...
Atlassian has released patches for high-severity vulnerabilities in its Jira, Confluence, Bitbucket, and Bamboo server and data center products. Learn more...