Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task...
Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure of 107 internet domains used by state-sponsored threat actors with ties...
Securing a company's systems used to be about securing the "perimeter," with firewalls keeping everything inside safe. However, the shift to distributed cloud environments...
Google has unveiled the security measures implemented in its latest Pixel devices to combat the increasing threat of baseband security attacks.
The cellular baseband, also...
A fraud campaign using fake trading apps and phishing sites targeted victims worldwide, according to a report from Group-IB.
The scheme, dubbed "pig butchering," involves...
Cybersecurity researchers are warning about attempts to exploit a newly disclosed security flaw in Synacor's Zimbra Collaboration. Proofpoint has observed this activity starting on...
The developers of the Rhadamanthys information stealer have introduced advanced features to the malware, which now includes the use of artificial intelligence (AI) for...