Cord-cutting, Russian style: Could the Kremlin sever global internet cables?
As the world watches the Kremlin’s military build-up along the Ukrainian border, the Irish military is worried about Russian naval activity in its own backyard.
Latest news on cybersecurity, including data breaches, security vulnerabilities, cyberattacks, malware and phishing attacks, data privacy and compliance, cybersecurity conferences and more.
As the world watches the Kremlin’s military build-up along the Ukrainian border, the Irish military is worried about Russian naval activity in its own backyard.
Researchers have demonstrated a new type of fingerprinting technique that exploits a machine's graphics processing unit (GPU) as a means to track users across the web persistently. Dubbed DrawnApart, the method..
An initial access broker group tracked as Prophet Spider has been linked to a set of malicious activities that exploits the Log4Shell vulnerability in unpatched VMware Horizon Servers.
Slovak cybersecurity firm ESET attributed the intrusion to an actor with "strong technical capabilities," calling out the campaign's overlaps to that of a similar digital offensive disclosed by Google Threat Analysis Group (TAG) in November 2021.
Misconfigurations in smart contracts are being exploited by scammers to create malicious cryptocurrency tokens with the goal of stealing funds from unsuspecting users.