A Nigerian national named Charles Onus has pled guilty in the District Court of the Southern District of New York to hacking into a payroll company’s...
The DeadBolt ransomware is now targeting ASUSTOR NAS devices by encrypting files and demanding a $1,150 ransom in bitcoins. This wave of attacks was first reported on...
Microsoft announced today that Microsoft Defender for Cloud now also comes with native protection for Google Cloud Platform (GCP) environments, providing security recommendations and threat detection...
The US Federal Trade Commission (FTC) said today that Americans reported losses of more than $5.8 billion to fraud during last year, a massive total increase...
Analysis of the recently-emerged Entropy ransomware reveals code-level similarities with the general purpose Dridex malware that started as a banking trojan. Two Entropy ransomware attacks against...
Ransomware attacks extended into the industrial sector last year to such a degree that this type of incident became the number one threat in the industrial...
Everything as a Service (XaaS) has taken the cybersecurity field by storm, with enterprise organizations outsourcing security and development functions to third parties, including Software as...
This past holiday season, malicious bots created a lot of disappointed shoppers. Because retailers were outsmarted by bots targeting exclusive goods, online shoppers hoping to buy...
In this interview with Help Net Security, Brian Dye, CEO at Corelight, talks about the trend of creating separate SIEMs for threat hunting and why this is not achieveable for all...
There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security professionals know this...