New hacker group targets airlines, refugees with well worn tools
The group used job and IATA related lures, as well as fake updates; immigration, tourism and visa related documents; and COVID-19 information to infect victims.
The group used job and IATA related lures, as well as fake updates; immigration, tourism and visa related documents; and COVID-19 information to infect victims.
Much of the responsibility of making sure that SIEMs reap maximum benefits from the ATT&CK framework falls on users’ ability to understand their own environments. But that’s not easy.
The partnership will allow the two organizations to share research, expertise and personnel as they explore new technologies and workforce solutions in cybersecurity, autonomous systems, microelectronics, and other areas.
“Botronica” translates human bot traffic into sounds as a creative way to generate awareness of malicious bot activity.
Two recent reports reiterate that even with progress, the skills gap continues to pose a significant threat to organizations.
Organizations during the ongoing COVID-19 crisis and global recession may find themselves relying more on external assistance from the greater hacking community as a way to augment their internal efforts to mitigate vulnerability risk.
Leaders from both the private and public sectors united to oppose a brief filed with the Supreme Court that they say could peg independent security researchers as threats –
and criminals.
In part one of a two-part series, SC Media examines how businesses and institutions in poorer or underserved regions may be less equipped to fight off cyberattacks than their well-funded counterparts in affluent cities.
Unlimited vacation, 401K-matching and… identity compromise protections? A new study finds that anti-ID theft services offered as a workplace benefit can be attractive to both employees and employers.
Apple on Wednesday officially launched its iOS Security Research Device (SRD) program — a significant milestone for the white-hat hacker community, which has made significant strides in recent years gaining the trust of software developers, tech manufacturers and website operators that previously were reluctant to work with outsiders on security issues. Under the terms of…