Cybersecurity Blog
A Cyber Breach Delays Poll Worker Training in Mississippi’s Largest County Before the Statewide Vote
Election officials in Mississippi’s most populous county had to scramble to complete required poll worker training after ...
UK’s NCSC Publishes Guidance to Help Firms Prepare for Post-Quantum Cryptography
Post-quantum cryptography (PQC) algorithms should be implemented to replace vulnerable traditional public key ...
Over Half of Users Report Kubernetes/Container Security Incidents
Cloud native development practices are creating dangerous new security blind spots for organizations in the US, UK, ...
SecuriDropper: New Android Dropper-as-a-Service Bypasses Google’s Defenses
Nov 06, 2023NewsroomMobile Security / Malware Cybersecurity researchers have shed light on a new dropper-as-a-service ...
US, South Korea and Japan launch group to tackle North Korea hacking
The United States, South Korea and Japan have decided to establish a high-level consultative body on cyber issues, ...
Iranian APT Targets Israeli Education, Tech Sectors With New Wipers
Since January 2023, an Iranian advanced persistent threat (APT) actor has been targeting higher education and technology ...
Healthcare’s road to redefining cybersecurity with modern solutions – Help Net Security
The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, ...
QNAP Warns of Critical Command Injection Flaws in QTS OS, Apps
The first vulnerability, tracked as CVE-2023-23368, allows remote attackers to execute commands via a network. The ...