Cyber Security
The operator, Colonial Pipeline, said it had halted systems for its 5,500 miles of pipeline after being hit by a ransomware attack. One of...
Hi, what are you looking for?
The operator, Colonial Pipeline, said it had halted systems for its 5,500 miles of pipeline after being hit by a ransomware attack. One of...
FILE – In this June 1, 2020, file photo, an officer holds a baton and shield as demonstrators gather to protest near the White...
Since 2019, ransomware gangs have leaked the stolen data for 2,103 companies on dark web data leaks sites. When modern ransomware operations began in 2013,...
While ransomware attacks continued throughout the week, for the most part, it has been quieter than usual, with only a few new variants released....
Cybercriminals are embracing data-theft extortion by creating dark web marketplaces that exist solely to sell stolen data. Long before ransomware gangs started extorting victims...
This week Twitter has begun experimenting with a new feature called ‘Tip Jar,’ which lets Twitter users tip select profiles to support their work. Twitter...
Two vulnerabilities discovered in Microsoft Azure Functions have been disclosed, although severity of one of the flaws was mitigated by a separate implementation bug....
The Mauritian government is considering plans to monitor and censor social media by intercepting web traffic. In a consultation document (PDF), the country’s Information and Communication...
Security researchers at Qualys have uncovered multiple security vulnerabilities in Exim, one of the most popular mail transfer agents used for public-facing email servers. During a...
Engineers at Google, Mozilla, and security firm Cure53 have come together to develop an application programming interface (API) that provides a systematic solution to...