Building a Fortress: 3 Key Strategies for IT Security | Threatpost
Last year and early spring has been undoubtedly tough for cybersecurity. We’ve seen one of – if not the – worst cyberattacks on U.S. companies Read More
Last year and early spring has been undoubtedly tough for cybersecurity. We’ve seen one of – if not the – worst cyberattacks on U.S. companies Read More
A nonsense tweet sent out from the official account of U.S. Strategic Command is no reason for alarm, according to the department. The social media Read More
Intel is being sued under a Florida state wiretapping law for using software on its website to capture keystrokes and mouse movements of people that Read More
Mobile device-tracking by Apple and Google take center stage in a report revealing that, despite both allowing users to opt out of sharing telemetry data Read More
At least 30 malicious images in Docker Hub, with a collective 20 million downloads, have been used to spread cryptomining malware, according to an analysis. Read More
Two high-ranked Apex Legends players have been banned from the platform for cheating by launching distributed denial-of-service (DDoS) attacks on an Xbox server. The players, Read More
The U.S. federal government is mulling changes to up its cybersecurity software game in the wake of the sprawling SolarWinds cyberattacks that came to light Read More
In January, the United States officially determined that China is committing genocide and crimes against humanity against Uyghur Muslims and ethnic and religious minority groups Read More
The patching level for Microsoft Exchange Servers that are vulnerable to the ProxyLogon group of security bugs has reached 92 percent, according to Microsoft. The computing Read More
A malware that has historically targeted exposed Windows machines through phishing and exploit kits has been retooled to add new “worm” capabilities. Purple Fox, which Read More