Barracuda researchers have noticed a steady stream of attacks attempting to exploit the Log4j vulnerability since it was found. What’s...more


Barracuda researchers have noticed a steady stream of attacks attempting to exploit the Log4j vulnerability since it was found. What’s...more

The company released its thoughts on the state of edge computing as part of its 2022 Cybersecurity Insights report. Image:...more

Symantec said that the newly-discovered Daxin exhibits a previously unseen level of complexity, and it’s been targeting governments around the...more

Eighty-four percent of organizations were phishing victims last year, 59% of whom were hit with ransomware. Why, then, do less...more

ICS vulnerability disclosures have grown by 110% since 2018, which Claroty said suggests more types of operational technologies are coming...more

Threat intelligence captured in the real world can warn IT security teams about the types of menaces that are on...more

Image: Tierney/Adobe Stock WordPress is one of the most widely-used Content Management Systems on the planet. With over 43% of...more

The vulnerability lies in how Samsung implemented a portion of the Android Trusted Execution Environment, leading to devices as new...more

Image: solarseven, Getty Images/iStockphoto Must-read security coverage Ukraine is suffering from a wide range of cyberattacks. One of the most...more

Far from only being an IT concern anymore, risk-altering cybersecurity decisions are now being made by people all over a...more