Cybersecurity Blog
Utility regulators take steps to raise sector’s cybersecurity ‘baselines’
Dive Brief: Cybersecurity requirements and questions for vendors should be included in utilities’ procurement processes, ...
4 Instructive Postmortems on Data Downtime and Loss
More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize ...
20 Million Cutout.Pro User Records Leaked on Data Breach Forum
Users of Cutout.Pro are advised to reset their passwords immediately and be cautious of targeted phishing scams due to ...
New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion
Mar 01, 2024NewsroomLinux / Cyber Threat Cybersecurity researchers have discovered a new Linux variant of a remote ...
Epic Games Says “Zero Evidence” of Hacking by Mogilevich Gang
Epic Games found no evidence of a cyberattack or data theft after the Mogilevich group claimed to have breached their ...
New Variant of AMOS Stealer Targets Safari Cookies and Crypto Wallets
The new Atomic variant uses Python and Apple Script code to target browser and system files, obtain user account ...
Airbnb scammers pose as hosts, redirect users to fake Tripadvisor site – Help Net Security
Scammers on Airbnb are faking technical issues and citing higher fees to get users to a spoofed Tripadvisor website and ...
Okta reports ‘minimal’ financial impact following support portal attack
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The ...