North Korean hackers have used Google Chrome extensions to gather personal data from South Koreans.The hack, which forms part of a long-running attempt at...
The U.S. House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection convened a hearing to examine the vulnerabilities of the U.S. critical infrastructure. The...
In our volatile and rapidly evolving world, the security and resilience of critical infrastructure have become paramount. Nation-states and other malicious actors are increasingly...
<!-- -->Over 100,000 messages have targeted thousands of organizations globally.The risk landscape on the internet has grown more complex as hackers come up with...
A new and sophisticated malware that impersonates Google Chrome and Microsoft has the potential to steal money from Microsoft device owners, cyber experts warn.
Since...
Cybersecurity agencies from the ‘Five Eyes’ alliance provided updates on the evolving risks to critical infrastructure and described how the nations within the Critical...