Security News

According to cybersecurity company Optiv, hackers are now impersonating each other to hide their true goals.

There is a war hitting small-town America. Hackers are not only on our shores, but they’re in our water districts, in our regional hospitals, and in our 911 emergency systems. The target du jour...

Germany-based car parts and defense solutions provider Rheinmetall announced on Thursday that production at its automotive plants in the United States, Brazil and Mexico was disrupted as a result...

Percentage-based URL encoding plus Google domain trickery is helping malicious emails to evade filters.

Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of packet capture The...

Now that you've completed your digital transformation, you need to build a system to protect this new way of doing business.

NATO member Poland will launch a cyberspace defense force by 2024 made up of around 2,000 soldiers qualified in cybersecurity, the defense minister said on Thursday after formally approving it. read more

HolistiCyber's Moshe Ishai on How Defenders Can Close the Security GapCyber defense is no longer about staying a step ahead - it's about trying to remain no further than a step behind the...

An analysis of threat techniques used by Silence Group, Goblin Panda and Zegost, which can help construct effective defenses.

Account takeover continues to be a lucrative path for fraudsters across all industry sectors. But Scott Olson of iovation says there are different levels of defense that can be deployed, based on...