by

US Government Indicts North Korean Hacker Rim Jong Hyok, $10M Reward

A grand jury in Kansas City has indicted Rim Jong Hyok, a North Korean intelligence operative who allegedly used ransomware to attack critical systems in the...

Read More →

by

What Are Access Control Lists? Definition, Working, Types, Best Practices, and Importance

Network admins use access control lists (ACLs) to define permissions associated with network traffic and control security and performance. In this article,...

Read More →

by

Mimecast Acquires Code42

Mimecast, a human risk management platform and cybersecurity provider, has announced the acquisition of Code42, a company specializing in insider risk...

Read More →

by

Researchers Identify Significant Vulnerabilities and Malicious Activities Within GitHub

Cyber security researchers discovered risks in GitHub’s workflows and deleted data, in addition to the distribution of malware through accounts. Learn...

Read More →

by

Google Chrome’s New Feature to Scan for Malicious Content in Password-Protected Files

Google has redesigned Chrome to include malware detection in even password-protected executable files. Find out more about the development and why it matters...

Read More →

by

Wiz Turns Away From $23 Billion Google Bid, Aims for IPO

Cybersecurity firm Wiz has turned down a $23 acquisition bid by Alphabet, Google’s parent company. Learn more about the development, the potential...

Read More →

by

CrowdStrike Outage: Official Remediation Resources and Guidance

The recent CrowdStrike and Microsoft outage impacted millions of devices globally. Both companies have now released official guidance and tools to fix the...

Read More →

by

UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack

Authorities in the UK have arrested a 17-year-old for his alleged connections to the cybercrime group Scattered Spider. Find out more about the development and...

Read More →

by

What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices

Acceptable Use Policies (AUPs) are rules for using company technology and data responsibly and safely. In this article, learn more about what they are, the key...

Read More →

by

Faulty CrowdStrike Update Leads to Global Microsoft Outage

A faulty update by CrowdStrike created a massive worldwide outage across Microsoft Windows systems. Thousands of people and businesses witnessed system crashes...

Read More →

by

Russian Antivirus Provider Kaspersky Lab Pulls Out of the US Market

Russian antivirus provider Kaspersky Lab has announced plans to leave the US market owing to the Biden administration’s ban on the sales and distribution...

Read More →

by

Atlassian Releases Patches for Critical Vulnerabilities in Server and Data Center Products

Atlassian has released patches for high-severity vulnerabilities in its Jira, Confluence, Bitbucket, and Bamboo server and data center products. Learn more...

Read More →

Close Search Window
Close