Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major Apps
SEC cyber risk management rule—a security and compliance opportunity
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Watering Hole Attacks Push ScanBox Keylogger
Ransomware Attacks are on the Rise
Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands
A Guide to Surviving a Ransomware Attack
RCE Bug in Spring Cloud Could Be the Next Log4Shell, Researchers Warn
Critical Firefox Zero-Day Bugs Allow RCE, Sandbox Escape
5 Cybersecurity Trends to Watch in 2022
New zero-day exploit for Log4j Java library is an enterprise nightmare
Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App
Microsoft’s 5 guiding principles for decentralized identities
Defense in Depth (DiD): Think Like a Hacker
Actively Exploited Windows Zero-Day Gets a Patch
NSA Warns Public Networks are Hacker Hotbeds
CISA’s Top 30 Bugs: One’s Old Enough to Buy Beer
The True Impact of Ransomware Attacks
Microsoft Issues Windows 10 Workaround Fix for ‘SeriousSAM’ Bug
LetMeIn101: How the Bad Guys Get Your Password