Data Theorem's free API Attack Surface Calculator helps security teams understand potential API exposures.
State-backed group is among a growing number of threat actors looking at supply chain companies as an entry point into enterprise networks.
Following demand from viewers, cybercriminals are not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes hitting the web.
IBM Announces Advances and New Collaborations in AI-Powered Automation, 5G Connectivity and Security at Mobile World Congress Los Angeles
IBM collaborates with Boston Dynamics, Cisco, Palo Alto Networks and Turnium Technology Group to help equip businesses in next phase of digital transformation.
CISA Announces Appointment of Washington Secretary of State Kim Wyman as Senior Election Security Lead
As an expert on elections, her appointment speaks to the Agency’s dedication to working with election officials throughout the nation in a non-partisan manner to ensure the security and resilience of our election infrastructure.
Unknown attackers hijacked gasoline pump machines and defaced them with a message that reportedly included a phone number for Supreme Leader Ayatollah Ali Khamenei's office.
Job satisfaction and salaries have both increased for cybersecurity professionals, as younger workers seek specific training to prepare for a cybersecurity career.
Operation Dark HunTor targeted opioid traffickers on the DarkNet, leading to the seizure of weapons, drugs, and $31 million.
Growing up with computers and the Internet doesn't necessarily convey all the advantages often attributed to younger users.
It's critical that infosec professionals and consumers understand threats and vulnerabilities, but they are being kept in the dark.
Weaknesses in the current WiFi standard and poorly chosen passwords allowed one wardriver to recover 70% of wireless network passwords.
New detection and alert functions within Carbonite Server increase data protection against ransomware.
The acquisition of Bitglass will be the third technology acquisition for Forcepoint this year.
Platform combines digital identity proofing, compliance verification and anti-money laundering checks.
Microsoft says the group has attacked more than 140 service providers, and compromised 14 of them, between May and October of this year.
While the industrial goods and services sector saw a decline in attacks during the third quarter, it remains the most targeted sector for ransomware this year.
Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.
The Cybersecurity Maturity Model Certification puts research universities in a position where they must validate the effectiveness of their security controls before applying for a grant or bidding on a government contract.
Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions.
Ransomware attacks continue to grow in number and severity, data shows, but organizations are stepping up to prepare for the threat.