Insights on Cyber Command malware samples — Where cyberspace meets outer space
An executable file disguised as a .jpg leads not only to ransomware but also its builder, which can be used to create variants.
141 predictions for 2020 from key participants in the cybersecurity defense industry, highlighting all that’s hot today and tomorrow
Russian hackers masqueraded as Iranian threat group OilRig by using its tools to perform spying attacks in 35 countries, says NSA and NCSC. The joint
From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.
Researchers believe the threat group is based in China.
Niloofar Razi Howe testified before the Cybersecurity, Infrastructure Protection and Innovation Subcommittee.
A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.
This is what we think might happen in the coming months, based on the knowledge of experts in this field and our observation of APT attacks – since APT threat actors have historically been ...
A fresh look at the penetration testing tool Metasploit reveals the 15-year old hacking tool still has some tricks up its sleeves even against modern defenses.
After a decade in senior cybersecurity positions, Manfra is to depart for the private sector.
New technology changes the operations and realities of organizations in all industries when it is widely adopted. It's no different with the latest innovation introduced by artificial ...
With the right cybersecurity certifications, you can attain your goals seamlessly and in a fast way and speed up your career. Cyber attacks are making headlines almost every day in today’s ...
An anti-hate speech law written in Berlin has been copy-pasted by authoritarian regimes from Caracas to Moscow.