A CISOs Practical Guide to Storage and Backup Ransomware Resiliency
One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual...
Read more →One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual...
Read more →Feb 14, 2023Ravie LakshmananDevice Security / Zero Day Apple on Monday rolled out security updates for iOS, iPadOS, macOS, and...
Read more →Feb 14, 2023Ravie Lakshmanan Web infrastructure company Cloudflare on Monday disclosed that it thwarted a record-breaking distributed denial-of-service (DDoS) attack...
Read more →Feb 13, 2023Ravie LakshmananGame Hacking / Cyber Threat An unknown threat actor created malicious game modes for the Dota 2...
Read more →There have been a number of reports of attacks on industrial control systems (ICS) in the past few years. Looking...
Read more →Feb 13, 2023Ravie LakshmananCyber Threat Intelligence The advanced persistent threat (APT) actor known as Tonto Team carried out an unsuccessful...
Read more →A previously unknown threat actor has been targeting companies in the U.S. and Germany with bespoke malware designed to steal...
Read more →Feb 11, 2023Ravie LakshmananRansomware / Endpoint Security After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for...
Read more →Suspected Russian threat actors have been targeting Eastern European users in the crypto industry with fake job opportunities as bait...
Read more →Feb 11, 2023Ravie LakshmananThreat Response / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three flaws...
Read more →Feb 10, 2023Ravie LakshmananSupply Chain / Software Security Four different rogue packages in the Python Package Index (PyPI) have been...
Read more →Here are three of the worst breaches, attacker tactics and techniques of 2022, and the security controls that can provide...
Read more →