Security News
Coalition, the leading cyber insurance company for small and midsize businesses, announced it has closed a $40 million funding round. Ribbit Capital led the investment with participation from...
In 2016, a hacker group calling itself the Shadow Brokers released a trove of 2013 NSA hacking tools and related documents. Most people believe it is a front for the Russian government. Since,...
Or so claims Symantec Months before CIA-built hacking tools were leaked to the public by a group calling itself the Shadow Brokers, the exploit code was apparently being used by Chinese state...
Symantec Report Deepens Mystery Around Lost NSA Tools and ExploitsA Chinese hacking group was using exploits and tools developed by the NSA months before the tools were released by another group,...
In a shocking revelation, it turns out that a hacking group believed to be sponsored by Chinese intelligence had been using some of the zero-day exploits linked to the NSA's Equation Group almost...
It’s bad enough losing an hour’s work when your computer crashes – but in settings like healthcare and aviation, software glitches can have far more serious consequences. In one notorious case, a...
Use Enpass audit tools to identify weak, identical, and old passwords.
If Enpass is your password manager of choice, there are three handy audit tools you should be using. Jack Wallen explains.
Kaspersky Details MuddyWater’s Post-Infection Tools The MuddyWater cyberespionage group is making use of a broad range of post-infection tools in their attacks, mostly developed in-house,...
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.