Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
AI systems have to be able to show a record of what happened and how.
Looking back over the years, I've spent an inordinate amount of time when planning a trip trying to find the best online price for my hotel stay.
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of…
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
View CSAF
Could America turn off Europe’s internet? That’s one of the questions that Graham and special guest James Ball will be exploring as they discuss tech…
Well, this is embarrassing.
A coordinated cyberattack that targeted Poland's energy infrastructure in late December 2025 has prompted cybersecurity agencies to issue urgent warnings to critical national infrastructure operators on both sides of the Atlantic. Read more in my article on the Fortra blog.
A 29-year-old Polish man has been charged in connection with a data breach that exposed the personal details of around 2.
AI bots are having existential crises, inventing religions, and allegedly plotting against humanity… or so the internet would have you believe.
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions…