Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations...
A Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations...
î „Ravie Lakshmananî ‚Jan 31, 2026Social Engineering / SaaS Security Google-owned Mandiant on Friday said it identified an "expansion in threat activity"...
î „Ravie Lakshmananî ‚Jan 31, 2026Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks...
The year got off to a busy start, with January offering an early snapshot of the challenges that (not just)...
In this blog post, we provide more technical details related to our previous DynoWiper publication. Key points of the report:...
In 2025, we spent a lot of time with enterprise SOC teams, CISOs, and large MSSPs. Discovery calls. Technical deep...
This week in scams, three headlines tell the same story: attackers are getting better at manipulating people, not just breaking into...
Bridging Compliance And Cybersecurity In Financial Reporting Guest Article by Marcie Clark ,the Director of Regulatory Services for Donnelley Financial Solutions Although financial compliance...
Are You Overlooking Non-Human Identities in Cloud Security? Machine identities have emerged as critical components that require immediate attention and...
How Are Non-Human Identities Shaping Cloud Security? What does it take to bridge the gap between security and R&D teams...
Session 11A: Blockchain Security 2 Authors, Creators & Presenters: Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School...
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers...
Windows developers are now focusing on improving the core experience in Windows 11, with Microsoft reportedly redirecting resources to address...
Authentication is the foundation of application security, yet it's one of the most frequently mishandled aspects of software development. With...
In the race to innovate, software has repeatedly reinvented how we define identity, trust, and access. In the 1990's, the...
Subscribe To InfoSec Today News