Security | News, how-tos, features, reviews, and videos
The UAC-0184 group targets Ukrainian military personnel, including those outside the country, and uses steganography to infect their devices with a remote access trojan.
LockBit leader said personal negligence led to the recent law enforcement seizure, and not much of significance was lost.
Vulnerabilities created by insecure code could lead to data leakage or corruption, and the burden is on Salesforce customers to mitigate.
Apple’s Shortcuts application has a bug that can allow attackers to remotely access sensitive data on Apple devices without user permission.
The vulnerability could allow attackers to bypass authentication or create a new admin account.
It’s time to move towards a more professional use of AI, CEO Gil Shwed said at Check Point’s CPX 2024 event, as the company announced the integration of artificial intelligence across its portfolio.
Increased attack speed and cloud compromise were also high on adversaries' agenda.
The White House announced a new executive order and other actions to strengthen the cybersecurity of the maritime industry and ports while seeking to revive a domestic crane industry and wean America off Chinese-made port cranes.
Recent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.
Abusing valid accounts became the most common entry point into victim environments in 2023.