Squirrelwaffle Malware Used to Drop Cobalt Strike

Penetration testers prefer Cobalt Strike when trying to replicate how cybercriminal tools would look when assaulting an organization’s network. Unfortunately, hackers adapted to it, and Cobalt became a popular second-stage…

Ransomware Dubbed Ranzy Locker Has Affected No Less Than 30 US Companies in 2021, FBI Reports

A flash alert was published on Monday by the Federal Bureau of Investigation emphasizing the effects Ranzy Locker ransomware has had over this year on US companies. According to the…

Linux Foundation: confidential computing market to reach $54 billion in 2026

The confidential computing market is expected to reach $54 billion by 2026, according to a new market study from the Linux Foundation and the Confidential Computing Consortium.  Conducted by Everest…

Weeks early: Adobe dumps massive security patch update

Adobe has issued a vast security update targeting 14 products including Lightroom, Photoshop, and InDesign.  On October 26, the tech giant issued over 80 patches for vulnerabilities including critical code…

Building Cybersecurity Resiliency – An Interview with a Threat Forensic Investigator

The threat landscape is changing. Crimeware, a class of malware designed specifically to automate cybercrime, is growing in prevalence. It’s often provided as a service or a pre-made, easy-to-execute kit…

Break into the elite field of cybersecurity by learning Risk Management Frameworks

StackCommerce ZDNet Recommends Best security key 2021 While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level.…

Microsoft warns over uptick in password spraying attacks

Cyber attackers aren’t just looking for software flaws, supply chain weakness, and open RDP connections. The other key asset hackers are after is identities, especially account details that will give…

Microsoft warns over uptick in password spraying attacks

Cyber attackers aren’t just looking for software flaws, supply chain weakness, and open RDP connections. The other key asset hackers are after is identities, especially account details that will give…

EPP EDR: What Is Each and How They Differ

When it comes to cybersecurity incidents, your company’s endpoints are some of the most important IT assets you want to monitor and protect. The massive increase in remote work due…

Ofcom's Scam Call-Blocking Plan Could Save Consumers Millions

Ofcom's Scam Call-Blocking Plan Could Save Consumers Millions A plan by the UK telecoms regulator to block scam calls from abroad could save consumers nearly £10m annually in money lost…