Insured entities are becoming more sophisticated in their views on how cyber policies fit into their broader risk management plans.
With employees looking for the benefits of artificial intelligence, a fintech company stepped up controls with automation.
These startups reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs.
Threat actors are using the social engineering technique and a legitimate Microsoft tool to deploy the DCRat remote access Trojan against targets in the hospitality sector.
Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset.
An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.
Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.
Cyber's role in the US raid on Venezuela remains a question, though President Trump alluded to "certain expertise" in shutting down the power grid in Caracas.
Microsoft said that Office 365 tenants with weak configurations and who don't have strict anti-spoofing protection enabled are especially vulnerable.
Hackers are attacking a critical zero-day flaw in unsupported D-Link DSL routers to run arbitrary commands.
Here are the top cloud security trends I'm seeing in my crystal ball for the New Year — particularly arming us for AI adoption.
The "ZombieAgent" exploit makes use of ChatGPT's long-term memory and advanced capabilities.