Salt Typhoon Exploits Cisco Devices in Telco Infrastructure
The China-sponsored state espionage group has exploited known, older bugs in Cisco gear for successful cyber intrusions on six continents in the past two months.
Roundtable: Is DOGE Flouting Cybersecurity for US Data?
Cybersecurity experts weigh in on the red flags flying around the new Department of Government Efficiency's handling of the mountains of US data it now has access to, potentially without basic information security protections in place.
How Public & Private Sectors Can Better Align Cyber Defense
With investment in cybersecurity capabilities and proactive measures to address emerging challenges, we can work together to navigate the complexities of combating cybercrime.
Chinese APT 'Emperor Dragonfly' Moonlights With Ransomware
Pivoting from prior cyber espionage, the threat group deployed its backdoor tool set to ultimately push out RA World malware, demanding $2 million from its victim.
Buffer overflow vulnerability elimination in software sought by feds
Such "unforgivable" memory safety issues, which have been observed in Microsoft, Ivanti, and VMware vCenter instances, could be circumvented with the utilization of safe and up-to-date coding languages, including Go, Rust, and Swift, according to the...
Trend Micro purchase reportedly sought by private equity firms
Aside from Advent International, Bain Capital, and EQT AB, KKR has also expressed wanting to take Trend Micro private, according to sources close to the matter.
Such an intrusion was claimed to have resulted in the erasure of user accounts and the locking of administrative accounts, with Tooda hackers alleging the release of Doxbin admins' personal information and a blacklist of individuals who had paid for...