Router botnet tied to Volt Typhoon’s critical infrastructure breaches
The Chinese threat group used the newly discovered KV-botnet, made up of compromised SOHO devices, as a stealth data transfer...
The Chinese threat group used the newly discovered KV-botnet, made up of compromised SOHO devices, as a stealth data transfer...
Following a quiet 2022, ransomware resurged in 2023 even as organizations got better at fighting it. Article Link: Ransomware surges,...
During this past year, we have seen an increase in the use of malicious ads (malvertising) and specifically those via...
The post Talkin’ About Infosec News – 12/15/2023 appeared first on Black Hills Information Security. Article Link: Talkin' About Infosec...
Google has announced that it will start rolling its Chrome web browser’s new Tracking Protection feature from January of 2024....
A new multiplatform threat that uses the peer-to-peer (P2P) NKN network connectivity protocol as a communication channel for launching a...
The SEC today denied crypto exchange Coinbase's petition to clarify new crypto rules for the digital assets industry. Coinbase isn't taking...
Google has announced that it will start rolling its Chrome web browser’s new Tracking Protection feature from January of 2024....
Amazon GuardDuty is a threat detection service that continuously monitors your Amazon Web Services (AWS) accounts and workloads for malicious...
By Deeba Ahmed Cybersecurity firm Zerocopter has launched the first-ever Cybersecurity Marketplace led by white-hat hackers. With cybercrime projected to...