Digital devices and home networks of corporate executives, board members and high-value employees with access to financial, confidential and proprietary information are ripe targets for malicious actors, according to a study released Tuesday by a cybersecurity services firm. The connected home is a ...

New research from Atlas VPN shows that cloud-native exploits on major cloud service providers (CSPs) declined during the first four months of 2022. Cloud-native exploits dropped by 25%, from 71 exploits in the first four months of 2021 to 53 exploits in the first four months of this year.

Government organizations and educational institutions, in particular, are increasingly in hackers’ crosshairs as severe web vulnerabilities spiral upward. Remote code execution (RCE), cross-site scripting (XSS), and SQL injection (SQLi) are all top software offenders. All three increase or hov...

The modern attack surface has grown too large and complex for security professionals to manage using traditional, manual approaches to the asset lifecycle.

Hours before Russia began its Ukraine invasion on Feb. 24, Microsoft found a new malware package, which it dubbed "FoxBlade." As more concerns about malware fallout from the war spread, several cybersecurity firms announced protective measures for potential victims.

Consumers, especially lonely hearts experiencing life's so-called golden years, are prime targets for romance scams and fraud assaults. Romance scams are at an all-time high. Even younger folks who share too much about their affairs of the heart on dating sites and social media could become ripe tar...

Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...

Nearly half a million Covid-related domains have been created over the last two years, many of them being used by online fraudsters. The pandemic has created an environment in which bad actors make use of a range of Covid-related "hooks" to commit cybercrime and fraud, impacting consumers and brand...

The biggest breach of the period was actually a combination of several cyber smash-and-grab operations over the years that contained 3.2 billion unique email and password combinations from Netflix, LinkedIn and other online outfits.

Russian authorities on Friday reported that they shut down the REvil ransomware operations and arrested a dozen or more gang members. The Federal Security Service of the Russian Federation said it quashed the REvil ransomware gang after U.S. authorities reported on the leader.

Cybercriminals in 2022 will move from identity theft to identity fraud, predicted the Identity Theft Resource Center. Bad actors are accumulating personal identifying information, but they're not using it to target consumers as much as they used to do. Rather, they're using it in credential attacks ...

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

Four out of five cybersecurity pros are fretting over the potential for a sneak attack by an adversary with a quantum computer that will render the encryption on their data ineffective. Quantum computers can process data much faster than most computers today because they use qubits to crunch data, w...

New research from cloud security firm Ermetic shows that nearly all businesses have identities that, if compromised, would place at least 90 percent of the S3 buckets in their AWS account at risk. Ermetic conducted the study to determine the circumstances that would allow ransomware to make its way ...

Will Elon Musk ultimately purchase Twitter?
Loading ... Loading ...

LinuxInsider Channels