The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars.
Related Articles
All CyberSecurityDive →Major tech vendors call for streamlining US foreign cyber aid
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Major tech and cybersecurity companies…
Cybersecurity firms brace for impact of potential Oracle Cloud breach
Information security firms are taking measures to protect customers and their own networks as they wait for official guidance following claims of a massive attack…
Fortinet FortiWeb flaws found in unsupported versions of web application firewall
Security researchers warn that two recently disclosed vulnerabilities in Fortinet FortiWeb can be exploited in attacks targeting earlier, unsupported versions of the web application firewall…
Fewer ransomware attacks encrypting data, new report finds
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Only half of ransomware attacks…
Google completes $32 billion acquisition of Wiz
Google on Wednesday said it completed a $32 billion agreement to buy Wiz, a leading cloud and AI security platform, marking one of the largest-ever…
Hackers exploiting critical Citrix Netscaler flaw, researchers say
A critical and closely watched vulnerability in Citrix NetScaler has reached the early stages of active exploitation, according to a blog post published Friday by Reliaquest. …

