Companies will need to re-evaluate their cyber-insurance premiums after major insurance companies have adopted exclusions for catastrophic cyberattacks conducted by "state-backed" actors.This limits the...
Cyberattackers have compromised the internal systems of LastPass, making off with source code and intellectual property.The password management company said it detected anomalous activity...
For more than two decades, the economic advantages of third-party firms' collection of information on consumers stymied technologists' dreams of giving people more control...
Two emerging ransomware gangs, known as RedAlert and Monster, have adopted cross-platform capabilities to make attacks easier to execute against multiple operating systems and environments....
Washington, D.C., Aug. 24 — Sen. Ron Wyden, D-Ore., issued the following statement following a complaint this week by a former Twitter employee that...
The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that a high-severity security vulnerability in Palo Alto Networks firewalls is being actively exploited...
The attackers responsible for the SolarWinds supply chain attack have added a new arrow to their quiver of misery: A post-compromise capability dubbed MagicWeb,...
In the face of never-ending threats and continued technology evolution, zero trust has quickly progressed from an intriguing idea and buzzword to a critical...
AUSTIN, Texas – Aug. 16, 2022 — CyberRatings.org, the nonprofit entity dedicated to providing transparency on cybersecurity product efficacy, has published the results of...
Portland, Ore. – Aug. 23, 2022
– Eclypsium®
and Vanson Bourne today released a new report that reveals the financial sector is ill-equipped to effectively tackle...
Software developers and operations teams continue to adopt DevOps and other agile methodologies as well as automation and low-code services, but they still struggle...