Browsing Category
Cybersecurity
Threat Modeling: Bridging the Gap Between Developers and Security…
By Stephen de Vries, Co-Founder and CEO of IriusRisk
The application security world is known for friction between security and…
#DTX2022: How to Scam Someone Using Social Media Phishing
Throughout their careers, many security professionals have come across people who say: ‘I bet you couldn’t hack me!’
In February…
Magniber Ransomware Adopts JavaScript to Attack Individual Users
Recent analysis shows that Magniber ransomware has been targeting home users by masquerading as software updates.
A ransomware…
Report Shows How China Has Been Using Cyberattacks Over the Past Decade
Chinese state-sponsored cyberattacks pose a growing threat to US national security, according to a report from consultancy firm…
A Belt-and-Suspenders Approach To Application Security
By Timothy Liu, CTO and Co-Founder, Hillstone Networks
In recent years, the pandemic and other forces have led to drastic changes…
Chinese APT WIP19 Targets IT Service Providers and Telcos
A new threat cluster, tracked by SentinelLabs as WIP19, has been targeting telecommunications and IT service providers across the…
Malicious WhatsApp Mod Spotted Infecting Android Devices
An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been spotted infecting devices with the known…
Budworm Espionage Group Returns, Targets US State Legislature
The advanced persistent threat (APT) actor known as Budworm has been spotted targeting a US-based entity for the first time in…
The Implications of Zero Trust for Data
By Julius Schorzman, Director of Product Management, Koverse, Inc., an SAIC Company
Zero Trust is a hot topic in network…
IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices
IoT devices from video conferencing systems to IP cameras are among the five riskiest IoT devices connected to networks, according…