4 Scenarios for the Digital World of 2040
September 2 2022Our digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.
Read moreOur digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.
Read moreOur digital future depends on the choices we make today. We need to invest in cybersecurity technologies and skills so that humanity can control its future.
Read moreInfections attributed to the USB-based worm have taken off, and now evidence links the malware to Dridex and the sanctioned Russian cybercriminal group Evil Corp.
Read moreThousands of corporate mobile apps developed by businesses for use by their customers contain hardcoded AWS tokens that can be easily extracted and used to access the full run...
Read moreThreat hunters can help build defenses as they work with offensive security teams to identify potential threats and build stronger threat barriers.
Read moreTAP assures its customers that it stopped data theft in a recent cyberattack, but the Ragnar Locker ransomware group says it made off with user info.
Read moreDetails are few, but Montenegro has suffered a cyberattack:
A combination of ransomware and distributed denial-of-service attacks, the onslaught disrupted government services and prompted the country’s electrical utility to...
Read more
Details are few, but Montenegro has suffered a cyberattack:
A combination of ransomware and distributed denial-of-service attacks, the onslaught disrupted government services and prompted the country’s electrical utility to...
Read more
IT has to get its hands around cloud data sprawl. Another area of focus should be on ghost data, as it expands the organization's cloud attack surface.
Read moreNeopets has confirmed that its IT systems were compromised from January 2021 through July 2022, exposing 69 million user accounts and source code.
Read more
Recent Comments