The Latest in IT Security

1

The Iranian state-aligned advanced persistent threat (APT) known as MuddyWater used an arsenal of new custom malware tools to spy on an unnamed Middle Eastern government for eight months, in just the latest of its many campaigns in the region. That’s according to Symantec, which describes a, at times, daily effort to steal sensitive government […]

Read more ...

1

Cybersecurity has been identity-centric since the first username and password appeared. During the infancy of personal computers, user identification was considerably simpler. At that time, workplace technology was physically confined to an office and the business network (if one existed). The only people with access were employees and maybe office cleaning staff. The locked office […]

Read more ...

1

Pro-Ukrainian hackers claimed responsibility for wiping the servers of the Trigona ransomware gang, a recently formed group that may have links to the Russian cybercriminal underground. The Ukrainian Cyber Alliance, a hacktivist collective, on Wednesday tweeted a screenshot of the gang’s apparently defaced dark web leak site now displaying a message that “Trigona is gone. […]

Read more ...


Categories

TUESDAY, MAY 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments