Suspicious Smartwatches Mailed to US Army Personnel
The US Army’s Criminal Investigation Division (CID) is warning service members to look out for unsolicited smartwatches arriving in the mail, which likely carry risks of malware and Read More
The US Army’s Criminal Investigation Division (CID) is warning service members to look out for unsolicited smartwatches arriving in the mail, which likely carry risks of malware and Read More
SAN JOSE, Calif., June 21, 2023 /PRNewswire/ — Airgap Networks, the innovation leader in cybersecurity solutions for business-critical networks, has announced the acquisition of NetSpyGlass, an innovative Read More
MIAMI, June 22, 2023 /PRNewswire/ — Sumsub, the global verification platform providing customizable KYC, KYB, transaction monitoring, and AML solutions for the whole customer journey, today announces the Read More
WASHINGTON–(BUSINESS WIRE) — DNSFilter today announced that Jon Oberheide, former Duo Security co-founder and CTO, has joined the company’s board of directors. A strategic appointment to Read More
Tanium, the industry’s only provider of converged endpoint management (XEM), today released major enhancements to the Tanium Software Bill of Materials (SBOM) that now include Read More
London, UK – 21 June 2023 – Silobreaker, a leading security and threat intelligence technology company, has announced its enhanced geopolitical threat intelligence capabilities with RANE (Risk Assistance Network + Read More
Millions of enterprise software repositories on GitHub are vulnerable to repojacking, a relatively simple kind of software supply chain attack where a threat actor redirects Read More
A bug in the latest version of Microsoft Teams allows for external sources to send files to an organization’s employees even though the application typically Read More
Espionage malware that spreads by self-propagating through infected USB drives is back, surfacing recently in an incident at a European healthcare institution, researchers have found. Read More
INFOSEC23 – London – Compliance with data-protection requirements remains one of the cornerstones of cybersecurity and risk management, but with the fifth anniversary of the General Read More