Search results for: “MITRE”
-
U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions
U.S. federal security agencies are putting companies on alert to potential threats from Russian state-sponsored cybercriminal groups, warning in particular about dangers to critical infrastructure…
-
Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse
About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Third-party security, ransomware, artificial intelligence (AI) and…
-
Log4Shell Exploitation Grows as Security Firms Scramble to Contain Log4j Threat
Cybercriminals are quickly ramping up efforts to exploit the critical flaw found in the widely used Log4j open-source logging tool, targeting everything from cryptomining to…
-
Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk
A critical vulnerability in the open-source logging software Apache Log4j 2 is fueling a chaotic race in the cybersecurity world, with the Apache Software Foundation…
-
Bitdefender vs. McAfee: Consumer & Enterprise Endpoint Security Software Compared
Endpoint security software is designed to detect, avert, and eradicate malware on endpoint devices like desktop computers, laptops, network servers, and mobile phones. Endpoint security…
-
The Best Wi-Fi 6 Routers Secure and Fast Enough for Business
Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that…
-
Arrest in Kaseya Attack Highlights Government Ransomware Progress
U.S. law enforcement officials this week announced the indictments of a Ukrainian national and a Russian citizen in connection with ransomware campaigns by the recently…
-
Fake Company Sheds Light on Ransomware Group Tactics
Ransomware groups seem to change form daily. In the latest news, the BlackMatter ransomware group announced it was shutting down – and just hours later…
-
‘Trojan Source’ a Threat to All Source Code, Languages
Researchers have outlined a method that could be used by bad actors to push vulnerabilities into source code that are invisible to human code reviewers.…
-
IBM Moves Into EDR Market With ReaQta Acquisition
IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its…
Latest Articles
Popular Categories
- Applications (97)
- Cloud (62)
- Compliance (34)
- Endpoint (73)
- Mobile (41)
- Networks (324)
- Products (351)
- Threats (319)
- Trends (164)