Police Arrest Suspected Ransomware Hackers Behind 1,800 Attacks Worldwide
12 people have been detained as part of an international law enforcement operation for orchestrating ransomware attacks on critical infrastructure and large organizations that hit over 1,800 victims across 71 countries...
Enterprises Allocating More IT Dollars on Cybersecurity
Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows....
Snyk Agrees to Acquire CloudSkiff, Creators of driftctl
New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift....
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors....
Russian National Accused of Role in Trickbot Is Extradited to US
Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group....
Cybercriminals Take Aim at Connected Car Infrastructure
While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the...
What Exactly Is Secure Access Service Edge (SASE)?
Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach....
This New Android Malware Can Gain Root Access to Your Smartphones
An unidentified threat actor has been linked to a new Android malware strain that features the ability to root smartphones and take complete control over infected smartphones while simultaneously taking steps...
Winter is Coming for CentOS 8
Winter is Coming for CentOS 8—but here is how you can enjoy your holidays after all.
The server environment is complex and if you're managing thousands of Linux servers, the last thing...
New 'Shrootless' Bug Could Let Attackers Install Rootkit on macOS Systems
Microsoft on Thursday disclosed details of a new vulnerability that could allow an attacker to bypass security restrictions in macOS and take complete control of the device to perform arbitrary operations...