Ohio-based Crown Equipment, which is among the largest industrial and forklift truck manufacturers in the world, has become a victim of a cyberattack “by an international cybercriminal organization,” the... Read more »
Concentric AI announced it has incorporated new industry compliance capabilities into its Semantic Intelligence DSPM solution. With these new innovative features, Concentric AI now identifies data risk within organizations’... Read more »
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration A new Rust malware called Fickle Stealer spreads through various attack methods and steals sensitive information. Fortinet... Read more »
CDK Global, a software-as-a-service (SaaS) provider for car dealers and auto equipment manufacturers, has suffered a cyberattack that has temporarily disrupted its customers’ operations. About CDK and its platform... Read more »
Which VPN is better, Norton Secure VPN or Surfshark? Use our guide to compare pricing, features and more. Read more »
Resecurity researchers warn of a new activity of Smishing Triad, which has expanded its operations to Pakistan. Resecurity has identified a new activity of Smishing Triad, which has expanded... Read more »
A researcher discovered a flaw that allows attackers to impersonate Microsoft corporate email accounts and launch phishing attacks. The security researcher Vsevolod Kokorin (@Slonser) discovered a bug that allows... Read more »
Verimatrix announced major enhancements to its XTD dashboard, providing customers with better visibility into application security risks and more actionable insights to better protect mobile apps and users. First... Read more »
In this Help Net Security interview, Julianna Lamb, Stytch CTO, discusses the advantages of passwordless authentication. Eliminating passwords reduces data breaches and improves user experience by simplifying the login... Read more »