Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB)…

‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

Identity-based attacks are on the rise. Attackers are targeting identities…

Why Cyber Quality Is the Key to Security

The time to secure foundations, empower teams, and make cyber…

Why The Modern Google Workspace Needs Unified Security

The Need For Unified Security Google Workspace is where teams…

Bogus ‘BianLian’ Gang Sends Snail-Mail Extortion Letters

The letters mimic typical ransom notes and threaten to delete…

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The latest Palo Alto Networks Unit 42 Cloud Threat Report…