Ransomware 3.0: The Next Frontier
October 4 2022Attackers are already circling back to reselling stolen data instead of — and in addition to — extortion.
Read moreAttackers are already circling back to reselling stolen data instead of — and in addition to — extortion.
Read moreAnother element of ML security is the data used to train the machine learning system itself.
Read moreWith organizations expanding their cloud operations, cloud security is imperative to protect applications and data.
Read moreOn some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis shows.
Read moreResponding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds.
Read moreAfter a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang.
Read moreCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreThis year's theme is "See Yourself in Cyber," and these security folks are using the month to reflect on the personal factor in cybersecurity.
Read more
Recent Comments