Source
DARKReading
The mobile device maker continues to investigate IntelBroker's claims of another high-profile data breach, with the cybercriminal group posting on BreachForums internal data allegedly stolen from Nokia through a third-party contractor.
In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough.
When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.
The suspect, tracked as UNC5537, allegedly bragged about hacking several Snowflake victims on Telegram, drawing attention to himself.
The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system.
Chinese-speaking adversaries are using a fresh Android banking Trojan to take over devices and initiate fraudulent money transfers from financial institutions across Latin America, Italy, Portugal, and Spain.
The cybercriminal group holding the stolen information is demanding the vendor admit to the breach and pay up.
Attackers are exploiting the "Envelopes: create API" of the enormously popular document-signing service to flood corporate inboxes with convincing phishing emails aimed at defrauding organizations. It's an unusual attack vector with a high success rate.
Government and industry want to jump-start the conversation around "human-centric cybersecurity" to boost the usability and effectiveness of security products and services.
Zero trust is a mature approach that will improve your organization's security.