In typical fashion, attackers are gearing up to take advantage of the surge in teleworking prompted by the pandemic. The speed at which organizations are being forced to respond...
Read moreVPN Usage Surges as More Nations Shut Down Offices
March 20 2020As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the...
Read moreVPN Usage Surges as More Nations Shut Down Offices
March 20 2020As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the...
Read moreThe collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019. An open Elasticsearch instance has exposed more than 5 billion...
Read moreThe collections contained information collected by a UK research firm on data breaches from the years 2012 to 2019. An open Elasticsearch instance has exposed more than 5 billion...
Read moreDDoS Attack Targets German Food Delivery Service
March 20 2020Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service. Cybercriminals have launched a distributed denial-of-service (DDoS) attack against German...
Read moreDDoS Attack Targets German Food Delivery Service
March 20 2020Liefrando delivers food from more than 15,000 restaurants in Germany, where people under COVID-19 restrictions depend on the service. Cybercriminals have launched a distributed denial-of-service (DDoS) attack against German...
Read moreQuantifying Cyber Risk: Why You Must & Where to Start
March 19 2020Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them. Risk. According to Mirriam-Webster the word has several meanings. First...
Read moreQuantifying Cyber Risk: Why You Must & Where to Start
March 19 2020Quantifying cybersecurity risks can be a critical step in understanding those risks and getting executive support to address them. Risk. According to Mirriam-Webster the word has several meanings. First...
Read moreProcess Injection Tops Attacker Techniques for 2019
March 19 2020Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows. The threat landscape of 2019 was dominated with worm-like activity,...
Read more
Recent Comments