AuthorJai Vijayan Contributing Writer
The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.
Tactic continues recent trend by attackers to use trusted cloud services to send and host malicious content.
Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows.
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.
Three weeks after company disclosed two critical vulnerabilities in the workload management utility, many organizations have not patched the technology yet, security vendor says.
But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.
A new analysis of iOS and Android apps released to Apple's and Google's app stores over the past five years found many to be deliberately breaking HTTPS protections.
'Prometheus' is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly.
The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer.
Siloscape is designed to create a backdoor in Kubernetes clusters to run malicious containers.