Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.
Read moreCredential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.
Read moreLet the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as...
Read moreResearchers discover 3-year-old critical firmware vulnerability, running in popular cloud servers used to power hyperscalers and cloud providers alike.
Read moreWhen you really need to make exceptions in cybersecurity, specify them as explicitly as you can.
Read moreMalware-Infested Smart Card Reader
May 26 2022Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and use them. But by all...
Read moreMost Common Threats in DBIR
May 25 2022Supply chain and ransomware attacks increased dramatically this year, which explains why so many data breaches in this year's DBIR were grouped as system intrusion.
Read moreForescout Launches Forescout Frontline to Help Organizations Tackle Ransomware and Real Time Threats
May 25 2022New threat hunting and risk identification service provides organizations with an enterprise-wide baseline of their threat landscape and risk exposure.
Read moreIs Your Data Security Living on the Edge?
May 25 2022Gartner's security service edge fundamentally changes how companies should be delivering data protection in a cloud and mobile first world.
Read moreA sprawling, multiyear operation nabs a suspected SilverTerrier BEC group ringleader, exposing a massive attack infrastructure and sapping the group of a bit of its strength.
Read more
Recent Comments