Identity & Access Management Security

Infostealer Malware Enable Attackers to Hijack Business Infrastructure

What happened Cybercriminals are increasingly using infostealer malware to steal credentials and...

Investigative Journalist Exposes White Supremacist Site Users

What happened An investigative journalist using the pseudonym Martha Root infiltrated three...

Cybercriminal Offers Alleged Utility Engineering Data for 6.5 BTC After Pickett US Breach

What happened A cybercriminal is offering about 139 GB of alleged utility engineering...

Europe Has Lost the Internet, Belgium’s Cyber Chief Warns

What happened Europe has lost the internet, Belgium’s cyber chief warns after...

Cognizant Hit With US Class‑Action Lawsuits After TriZetto Data Breach

What happened Cognizant hit with US class-action lawsuits after a TriZetto data...

Popular

CISO Diaries: Nikolas Oelkrug-Alders on Moving Beyond Compliance to Real Risk Reduction

Cybersecurity is often reduced to checklists, frameworks, and dashboards,...

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...