In the Hacker’s Crosshairs: Active Directory
Organizations Need to Adjust Their Security Strategies to Match Modern Threats The easiest way for a cyber-attacker to gain access to sensitive data is...
Organizations Need to Adjust Their Security Strategies to Match Modern Threats The easiest way for a cyber-attacker to gain access to sensitive data is...
A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network, according to...
Google on Monday disclosed details about an ongoing campaign carried out by a government-backed threat actor from North Korea that has targeted security researchers...
Google late Monday raised the alarm about a “government-backed entity based in North Korea” targeting — and hacking into — computer systems belonging to...
Group of hooded hackers shining through a digital north korean flag cybersecurity concept Michael Borgers, Getty Images/iStockphoto Google said today that a North Korean...
Cybersecurity firm SonicWall said late on Friday that some of its internal systems were targeted by “highly sophisticated threat actors” exploiting what appear to...
The hackers behind the ransomware attack on the Scottish Environment Protection Agency (SEPA) have published thousands of stolen files after the organisation refused to...
Amazon has addressed a number of flaws in its Kindle e-reader platform that could have allowed an attacker to take control of victims’ devices...
Microsoft on Wednesday released another report detailing the activities and the methods of the threat actor behind the attack on IT management solutions firm...
It’s known that the hackers behind the SolarWinds supply chain attack were highly-skilled and patient. But now Microsoft’s security researchers have outlined some of...