Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing data stolen ...
Learn about 5 powerful cloud security automations with Blink Ops to simplify security operations like S3 bucket monitoring, ...
CISA has added three flaws to its 'Known Exploited Vulnerabilities' (KEV) catalog, among which is a critical hardcoded ...
A notorious hacker named USDoD, who is linked to the National Public Data and InfraGard breaches, has been arrested by Brazil ...
Google Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover ...
Iranian hackers are breaching critical infrastructure organizations to collect credentials and network data that can be sold ...
A critical vulnerability in Kubernetes could allow unauthorized SSH access to a virtual machine running an image created with ...
The United States Department of Justice unsealed an indictment today against two Sudanese brothers suspected of being the ...
The North Korean hacking group ScarCruft launched a large-scale attack in May that leveraged an Internet Explorer zero-day ...
A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security ...
The Finnish Customs office took down the website and seized the servers for the darknet marketplace 'Sipulitie' where ...
Google Play, the official store for Android, distributed over a period of one year more than 200 malicious applications, ...