Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization's Systems Researchers went undercover and posed as willing "insider threats" to expose and study an unusual hybrid BEC-style social engineering-ransomware scheme.
More Than 47M Affected in T-Mobile Breach T-Mobile has confirmed stolen records included account information for 7.8 million current customers and 40 million former or prospective customers.
Security Vendors Sound the Alarm on LockBit Ransomware's Return Threat group claims version 2.0 of malware can encrypt 100 gigabytes of data twice as fast as its rivals.
How Much Cybersecurity Can $1.9 Billion Buy? The bipartisan infrastructure bill will invest nearly $2 billion into cybersecurity, but security experts worry the sum is nowhere near enough.
The Emerging AI Security Threat: 4 Ways To Prepare Artificial intelligence represents a huge opportunity for cybercriminals to wreak havoc and extort organizations as AI becomes more pervasive.
A 6-Step Checklist for a Successful & Secure Cloud Modernization As organizations undergo digital transformation at an accelerating pace, teams should use this checklist to ensure the enterprise fully leverages a cloud modernization to gain scale, velocity, and agility without sacrificing security.
Confucius Targets Pakistani Military With Pegasus Spyware Lures The threat group conducted a recent spear-phishing campaign that uses Pegasus spyware-related lures to trick victims into opening malicious files.
CISA Releases Guidance for Ransomware Defense & Response Officials' recommendations include having encrypted backups and creating an incident response plan.
Name That Toon: Screen Time Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.