Cybersecurity Workforce Shortage Continues

For years, we’ve known about the impending shortage of the information security workforce, as evidenced by…

Ransomware crooks are targeting vulnerable

The ransomware gang identified as DoppelPaymer has leaked a substantial collection of files from the Illinois…

Why University of Minnesota is Getting Banned from Contributing to Linux Kernel Code

Kroah-Hartman, one of the most respected of all the Linux kernel developers, tweeted, “Linux kernel developers…

Hackers Are Exploiting Discord Links to Serve Up Malware

What is Discord Malware? Discord is a free online chat application where you can share data…

The Zero Trust security model is not new and it has been in discussions and practice for quite some time

What is zero trust security Definition? Zero-trust security is an IT security model that limits who…

Microsoft leaks new look for Windows 10

Over the past several months, we’ve been reporting about rounded corners for the top-level UI components…

Criminals are installing Cryptojacking Malware on unpatched M. Exchange Servers

Cybercriminals continue to exploit unpatched Microsoft Exchange servers. Cybersecurity researchers at Sophos report an unknown attacked has been…

SolarWinds hack and election meddling

The Biden administration completed an intelligence review of alleged Russian meddling in the SolarWinds cybersecurity attack and interference…

Chrome Zero-Day Exploit Posted

A security researcher has dropped a zero-day remote code execution vulnerability on Twitter that works on…

623M Payment Cards Stolen from Cybercrime

According to Group-IB, a database containing stolen payment cards has been hit by hackers, who were…