Source
DARKReading
Test methodologies published today, and their scope includes security effectiveness, performance, stability and reliability, and total cost of ownership.
The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.
Exploit allows unsigned and unnotarized macOS applications to bypass Gatekeeper and other security, without notifying the user.
Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.
The trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.
Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.
The malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram.
While organizations wait for an official patch for the two zero-day flaws in Microsoft Exchange, they should scan their networks for signs of exploitation and apply these mitigations.
Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid.
It's time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to cybercriminals, even unsophisticated ones.