Publisherâs Spotlight: Veriti
By Gary S. Miliefsky, Publisher, Cyber Defense Magazine Transforming Exposure Management with Safe, Automated Remediation Organizations today invest
Age Verification Using Facial Scans
Discord is testing the feature: âWeâre currently running tests in select regions to age-gate access to certain spaces or user settings,â a spokesperson for Discord said in a statem...
CVE Program Almost Unfunded
Mitreâs CVEâs programâwhich provides common naming and other informational resources about cybersecurity vulnerabilitiesâwas about to be cancelled, as the US Department of Homeland...
The best VPN routers of 2025
Looking for a router that can provide full, convenient VPN coverage at home? These are the best routers that support VPN installation or include pre-installed software.
The best free VPNs of 2025: Expert tested
We tested the best free VPNs from reputable companies that offer solid services. Here's what to know, how to avoid security risks, and what ZDNET's recommendations are.
MITRE CVE Program in Jeopardy
As a former advisory board member to the CVE/OVAL initiatives, Iâm sounding the alarm: MITRE has confirmed that funding for the CVE and CWE programs will
Slopsquatting
As AI coding assistants invent nonexistent software libraries to download and use, enterprising attackers create and upload libraries with those namesâlaced with malware, of course...
Cyber Resilience is More Than a Buzzword
For business leaders, cyber resilience ensures continuity in the face of disruption. For practitioners, itâs about having the right tools, processes, and mindset to combat evolving...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: Iâm giving an online talk on AI and trust for the Weizenbaum Institute on April 24, 2025 at 2:00 PM CEST (8:00 AM ...
TraderTraitor: The Kings of the Crypto Heist
Allegedly responsible for the theft of $1.5 billion in cryptocurrency from a single exchange, North Koreaâs TraderTraitor is one of the most sophisticated cybercrime groups in the ...
AI Vulnerability Finding
Microsoft is reporting that its AI systems are able to find new vulnerabilities in source code: Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer o...
Reimagining Democracy
Imagine that all of usâall of societyâhave landed on some alien planet and need to form a government: clean slate. We do not have any legacy systems from the United States or any o...
China-based SMS Phishing Triad Pivots to Banks
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-ca...
Patch Tuesday, April 2025 Edition
Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that is already being exploited in t...
Arguing Against CALEA
At a Congressional hearing earlier this week, Matt Blaze made the point that CALEA, the 1994 law that forces telecoms to make phone calls wiretappable, is outdated in todayâs threa...
How ToddyCat tried to hide behind AV software
While analyzing a malicious DLL library used in attacks by APT group ToddyCat, Kaspersky expert discovered the CVE 2024-11859 vulnerability in a component of ESETâs EPP solution.
New at Forter: April 2025
Enhanced fraud models, driving growth with payments, and AI-powered customer insights highlight what's New at Forter for April 2025
Cisco Smart Licensing Utility Vulnerabilities
Multiple vulnerabilities in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to collect sensitive information or administer Cisco Smart Licensing Utili...
When money markets move, so do fraudsters
Financial volatility in 2025 is creating new risk frontiers. Learn how global crises, exchange rate swings, crypto fluctuations, and tariffs fuel fraud in alternative payments and ...
Fast Flux: A National Security Threat
This advisory encourages service providers to help mitigate the fast flux threat by developing accurate, reliable, and timely detection analytics and blocking
When Getting Phished Puts You in Mortal Danger
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for ...
Financial cyberthreats in 2024
The Kaspersky financial threat report for 2024 contains the main trends and statistics on financial phishing and scams, mobile and PC banking malware, as well as recommendations on...
What Counts as an Account?
Fake accounts cost businesses more than you think. Learn how to identify, manage, and mitigate fake profiles in todayâs AI-driven world.
Operation FishMedley
ESET Research is publishing its investigation of Operation FishMedley, a global espionage operation by the China-aligned APT group FishMonger.
Operation FishMedley
ESET Research is publishing its investigation of Operation FishMedley, a global espionage operation by the China-aligned APT group FishMonger.
#StopRansomware: Medusa Ransomware
Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300
Beware: Tax Season is Scam Season
Tax season is also prime time for tax scams. To safeguard your personal information, consider these key points: Communication methods The IRS initiates contact primarily through ma...
2024 Malicious Infrastructure Report
Explore key 2024 cybercrime trends, including the rise of malware-as-a-service (MaaS), mobile malware, and Chinese and Russian state-sponsored threats. Learn how Insikt Group's exp...
âTis the Season for Holiday Shopping Scams
The holidays are typically the time of year for gifting presents to friends and family or donations to charity. Unfortunately, not-so-jolly fraudsters take advantage of this genero...
Scams Targeting Seniors
Scammers target seniors more aggressively than any other group. Recognizing the most common scams helps prevent your money and personal information from getting stolen.
IRS Identity Theft Season Begins Now
Each year thieves try to steal billions in federal withholdings by stealing your identity. As the IRS focuses more attention on this quickly growing problem, now is the time of yea...
Five Ways to Protect Your Finances from Fraud
With fraud on the rise, itâs important to understand how to best protect yourself and your financial accounts. Here are five ways you can stay proactive to avoid fraudulent credit ...
Summer 2023 Tax Deadlines and IRS News
Upcoming Tax Deadlines June 15 â Second quarter 2023 individual estimated tax payments are due. August 1 â Due date for filing 2022 retirement or employee benefit plan returns (550...
Avoid IRS Phishing Schemes
Tax season is a prime opportunity for identity thieves who target your personal information through phishing scams.
Scammers Team Up
In this post, learn ore about recent cyber attacks and how to avoid them.
The Worldâs Identity Platform
Learn about the new Trulioo integrated, high-speed, global identity platform that helps your organization foster growth, innovation and trust.
What is a Money Mule Scam?
A Money Mule Scam occurs when the victim, often unknowingly, acts as a âmuleâ to transfer money so criminals can avoid financial institutions.
Recognizing Lonely Heart Scams
Among the most insidious types of fraud we see are Lonely Heart, or Romance Scams, because they combine traditional theft with emotional betrayal of someone who has built a relatio...