Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Cape offers a privacy-focused mobile virtual network operator (MVNO) service for consumers, enterprises, and governments.
Between late December 2025 and mid-January 2026, hackers stole personal and health plan information from Navia’s environment.
Google adds 24-hour sideloading delay amid 17 malware families in 4 months, reducing scam-driven installs and device compromise risk.
The attacks started on February 27 and have targeted e-commerce platforms, global brands, and government services.
A ransomware gang that claims to be a group of "investigative journalists"? Meet LeakNet - the group using fake CAPTCHA pages to trick employees into hacking themselves. Read more in my article on the Fortra blog.
AI-based cyber attacks often blend in with normal behavior. Learn why behavioral analytics must adapt to protect digital identities from AI-based thre
North Carolina musician Michael Smith has pleaded guilty to collecting over $10 million in royalty payments through a massive streaming royalty fraud scheme on Spotify, Apple Music, Amazon Music, and YouTube Music.
Magento flaw allows unauthenticated file uploads up to 2.4.9-alpha2, enabling RCE or takeover, exposing stores to attack risk.
The company will invest in expanding its digital brand protection platform and in scaling its go-to-market efforts.
Yesterday, I discovered a malicious Bash script that installs a GSocket backdoor on the victim's computer. I don't know the source of the script not how it is delivered to the victim.
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices.