Signs hint at Russia's APT28, aka Fancy Bear, being behind the attacks, according to new research.
Read moreHow Does Threat Modeling Work in Software Development?
January 25 2022Threat modeling should be a continuous process alongside development, not a one-time project.
Read moreLink11 Sets New Standards in DDoS Protection as Test Winner
January 25 2022In a recent performance test, cybersecurity provider Link11 was benchmarked against leading international security vendors and emerged as the winner. The study by Frost & Sullivan emphasized the importance...
Read moreScary Fraud Ensues When ID Theft & Usury Collide
January 25 2022What's worse than finding out that identity thieves took out a 546 percent interest payday loan in your name? How about a 900 percent interest loan? Or how about...
Read more8 Security Startups to Watch in 2022
January 25 2022Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
Read moreStriking a Balance Between Cybersecurity Awareness and Anxiety
January 25 2022Employees don't have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them.
Read moreTax scam emails are alive and well as US tax season starts
January 25 2022If in doubt, don't give it out! (And don't forget that no reply is often a good reply.)
Read moreAs IoT Attacks Increase, Experts Fear More Serious Threats
January 25 2022Variants of the Mirai codebase are still a popular way to compromise and subvert Internet of Things devices, but experts fear more serious threats may be ahead.
Read moreMerck Wins Insurance Lawsuit re NotPetya Attack
January 25 2022The insurance company Ace American has to pay for the losses:
On 6th December 2021, the New Jersey Superior Court granted partial summary judgment (attached) in favour of Merck...
Read more
4 Steps Toward Knowing Your Exploitable Attack Surface
January 25 2022Actionable steps you can take today to identify the true risk your organization faces — learn how to separate the exploitable vulnerabilities from the rest.
Read more
Recent Comments