The US Cybersecurity and Infrastructure Security Agency’s 2024 Year in Review marks Jen Easterly’s final report before ...
The Lumma Stealer infostealer malware is increasingly sought after by cybercriminals, according to cybersecurity firm ESET ...
The past year was marked by the decline of ALPHV/BlackCat, the disruption of LockBit and the rapid emergence of RansomHub ...
Top cybersecurity leaders tell Infosecurity what they believe to be the biggest challenges in the industry today ...
Security researchers have urged customer-facing businesses to improve their verification checks after discovering a large-scale identity farming operation on the dark web. The unnamed underground ...
ESA, when implemented as a quality management and resilience function, enhances the quality of products and services while ...
A series of critical vulnerabilities affecting the widely used WPLMS and VibeBP plugins for WordPress have been identified by security researchers. These plugins are essential components of the WPLMS ...
Kevin Bocek highlights similarities between the shift to shorter public certificate lifespans and the transition to ...
Infosecurity has been covering the impact GenAI has had on cybersecurity from how the models can be compromised and what use ...
The Information Commissioner’s Office has warned that millions of Brits don’t know how to erase personal data from their old ...
A new digital operation has enabled Interpol to identify scores of human traffickers operating between South America and ...
US healthcare giant Ascension revealed that 5.6 million individuals have had their personal, medical and financial ...