Utility regulators take steps to raise sector’s cybersecurity ‘baselines’

Dive Brief: Cybersecurity requirements and questions for vendors should be included in utilities’ procurement processes, ...

4 Instructive Postmortems on Data Downtime and Loss

More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize ...

20 Million Cutout.Pro User Records Leaked on Data Breach Forum

Users of Cutout.Pro are advised to reset their passwords immediately and be cautious of targeted phishing scams due to ...

New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion

Mar 01, 2024NewsroomLinux / Cyber Threat Cybersecurity researchers have discovered a new Linux variant of a remote ...

Epic Games Says “Zero Evidence” of Hacking by Mogilevich Gang

Epic Games found no evidence of a cyberattack or data theft after the Mogilevich group claimed to have breached their ...

New Variant of AMOS Stealer Targets Safari Cookies and Crypto Wallets

The new Atomic variant uses Python and Apple Script code to target browser and system files, obtain user account ...

Airbnb scammers pose as hosts, redirect users to fake Tripadvisor site – Help Net Security

Scammers on Airbnb are faking technical issues and citing higher fees to get users to a spoofed Tripadvisor website and ...

Okta reports ‘minimal’ financial impact following support portal attack

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The ...

1 312 313 314 315 316 317 318 319 320 321 322 659