UPDATED Security researchers have detailed how a series of moderate severity vulnerabilities in IT monitoring technology Nagios could be chained together to attack organizations on a grand scale. Researchers...
Distributed denial of service (DDOS) attacks – when an attacker attempts to make it impossible for a service to be deliverable – are increasing in size,...
Last week’s cyber attack crippled one of the largest pipelines in US, Colonial Pipeline. This was a case of ransomware attack, where hackers usually threaten to...
In the two decades since cybersecurity awareness programs emerged, they’ve been transformed from a good idea to a business imperative. Many people think cybercriminals hide in...
CyberNews researchers found that crooks could abuse cryptocurrency exchange API keys and steal cryptocurrencies. CyberNews researchers found that cybercriminals are able to abuse cryptocurrency exchange API...
Cybersecurity company Dragos released a report this week showing a browser from the city of Oldsmar visited a website with malicious code the same day as...
Constella Intelligence research reveals that one in four cybersecurity leaders use the same passwords for both work and personal use; more than half experience account takeover...
COVID-19 brought with it a massive influx of data, most of it moving from a centralized location to the cloud (and other environments). Now, these businesses...
2020 was a year like no other. The first true global pandemic in our modern age rocked the world, throwing our way of living and doing...
New Jersey Courts’ IT security team have shared how they switched to secure remote working with just three days’ notice as the Covid-19 pandemic took hold last year....