While risk assessment is a regular topic of conversation today, when it comes to practicing good risk estimations and decisions in our daily lives, humans have some serious shortcomings.
Threat actors could use a recently discovered Windows 10 zero-day flaw to take over a computer and bypass local privilege escalation.
Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
A social media post from one of a company's interns was all this people hacker needed to enter a secure area with a counterfeit employee badge.
Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline.
Researchers observed cybercriminals selling an updated version of the KPOT stealer on some underground hacking forums.
There is some confusion in cybersecurity as to the difference between penetration testing and red teaming. Since all businesses have vastly different security needs, the distinction is critical.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?
According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.