Brooks Kraft LLC/Corbis via Getty ImagesYour pricey smartphone can be hit by many security threats, from phishing to malware to spyware. All it takes is one successful attack to clobber your...
Brooks Kraft LLC/Corbis via Getty ImagesYour pricey smartphone can be hit by many security threats, from phishing to malware to spyware. All it takes is one successful attack to clobber your...
zf L/Getty ImagesAs the Internet Archive still struggles to recover from a devastating cyberattack last month — there’s good and bad news.The good? More of the site’s...
The cybersecurity firm Sophos agreed to acquire Secureworks in an all-cash transaction valued at $859 million, the two companies announced Monday. Sophos, a privately owned United...
Due to evidence of active exploitation, CISA added three vulnerabilities to its Known Exploited Vulnerabilities Catalogue. These vulnerabilities are: Microsoft Windows Kernel TOCTOU Race Condition Vulnerability...
The U.S. government has announced a reward of up to $10 million for information about the Russian media organization Rybar and its employees, amid allegations it’s...
The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting...
We’ve got a hard truth to share with you, and you might not like it: You are not your software vendor’s top priority. Your vendor is...
Australian businesses now have a list of best practices to refer to when using commercial AI products. The Office of the Australian Information Commissioner (OAIC) published...
Researchers from ETH Zurich have discovered new vulnerabilities in Intel and AMD processors, six years after the Spectre security flaws were first identified. The new Spectre...