Money Ransomware Group Enters Double-Extortion Fray
April 14 2023Ransomware group uses API calls to spread throughout shared network resources, researchers say.
Read moreRansomware group uses API calls to spread throughout shared network resources, researchers say.
Read moreQuantum computers might be a decade away, but guess how long it will take to switch systems over to post-quantum cryptography?
Read moreSomething exciting to liven up tax season: cybercriminals accessing sensitive personal information for individuals through the army of accountants preparing for Tax Day in the US.
Read moreThe ransomware attack proves that even the wealthiest cannot buy their immunity from threat actors.
Read moreAn "open" Internet faces challenges from autocratic governance models. Policymakers should instead think about creating an Internet that's equitable, inclusive, and secure.
Read moreI'm sorry, Dave. I'm afraid I can't... errr, no, hang on a minute, I can do that easily! Worldwide! Right now!
Read moreTo report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report...
Read moreA novel credential harvester compromises SMTP services to steal data from a range of hosted services and providers, and can also launch SMS-based spam attacks against devices using US...
Read moreThere are plenty of AD objects and groups that should be considered tier zero in every environment, but some will vary among organizations.
Read moreThieves cut through the wall of a coffee shop to get to an Apple store, bypassing the alarms in the process.
I wrote about this kind of thing in...
Read more
Recent Comments