SEC disclosure rule for ‘material’ cybersecurity incidents goes into effect
The controversial rule requires publicly traded companies to report such events to the agency within four business days.
The controversial rule requires publicly traded companies to report such events to the agency within four business days.
A long-running espionage campaign shows signs of iteration and development amid Gaza fighting, researchers say.
Microsoft’s decision to disable macros by default last year has forced hacking crews to find new, and sometimes old, ways to get a foothold.
The action against illicit versions of legitimate Cobalt Strike applications represents the culmination of a year-long investigation.
Researchers at Mandiant identified a new hacking group knowns as APT 43 that uses stolen bitcoin to fund cyberespionage operations.
A persona dubbed Sara Shokouhi recycled photos of a Russian psychologist and tarot card reader to pose as a Middle East-focused researcher
North Korean hackers known for cryptocurrency heists are expanding their targets to include education, government and healthcare, according to researchers tracking the group. The activity could be a sign that the group, which is suspected in two high-profile cryptocurrency hacks in 2022, may have even bigger plans for 2023. Researchers at the cybersecurity firm Proofpoint […]
The group known as TA453 has added “outlier” attacks to its portfolio over the past two years, seemingly in concert with Iranian hardliners.
Twitter is one of the key platforms for the information security community to share information. What happens if researchers flee?
The tactic linked to an Iranian group creates the impression the email activity is real by employing a phenomenon known as “social proof.”