Pharmaceutical company Eisai has disclosed it suffered a ransomware incident that impacted its operations, admitting that attackers encrypted some of...
The Defense Cyber Crime Center launched a pilot with “a few dozen” companies participating. A Defense Department unit kicked off a pilot program to allow hackers...
A Defense Department Inspector General report surveyed more than 56,000 employees about telework during the pandemic. The Defense Department began pivoting to telework in March 2020,...
Agencies must acknowledge this threat and take steps to prepare, defend and remediate. Cybersecurity and IT remain top concerns on the Government Accountability Office’s high-risk list within our...
Software vendors will be obliged to promptly notify their US federal government customers in the event of any security breach, a draft executive order from President Joe Biden’s administration...
A malware attack against vehicle inspection services provider Applus Technologies paralyzed preventing vehicle inspections in eight US states. Applus Technologies is a worldwide leader in the...
The principle of end-to-end encryption underpins a system of communication where only the communicating users can read the messages. To this end, it exists to prevent...
INTRODUCTION The developers of the Phobos ransomware have added new fileless and evasive techniques to their arsenal. Constantly keeping their attack up to date helps them...
Browser lockers (aka browlocks) are a class of online threats that prevent the victim from using the browser and demand a ransom. A locker is a...
Recently, 360 Security Center’s threat monitoring platform has detected an email phishing attack. This attack uses a secret-stealing Trojan called Poulight. The Poulight Trojan has been...
Like many countries, the UK runs a census every ten years. The census asks each household in the country to provide answers to a series of...
Recent Comments