What makes a ransomware attack eight times as costly? Compromised backups
Graham Cluley is an award-winning cybersecurity public speaker, podcaster, blogger, and analyst. He has been a well-known figure in the...
Graham Cluley is an award-winning cybersecurity public speaker, podcaster, blogger, and analyst. He has been a well-known figure in the...
Class-Action Lawsuit against Google’s Incognito Mode The lawsuit has been settled: Google has agreed to delete “billions of data records”...
Staying up to date with the latest in cyber security has arguably never been more paramount than in 2024. Financial...
HSBC Bank has been caught out by poor data quality, leading to fines for Consumer Data Right (CDR) breaches. ...
VIPRE Security Group has been named a 'Major Player' in the Worldwide Modern Endpoint Security for Small Businesses 2024 Vendor...
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...
Apr 02, 2024NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing...
SendQuick has been named a Bronze Globee Award winner in the Authentication Solution category at the 20th Annual 2024 Globee...
Video Much has been written about the risks that poorly-secured RDP connections entail, but many organizations continue to leave themselves...
Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life...
A significant development has been announced for automated secrets detection and remediation pioneer GitGuardian. The cybersecurity firm has unveiled its...
Information technology (IT) and physical security have been on a converging path for years. As physical security systems switched from...
Mar 27, 2024NewsroomVulnerability / Cybercrime A new phishing campaign has been observed leveraging a novel loader malware to deliver an...
Two China-linked advanced persistent threat (APT) groups have been observed targeting entities and member countries affiliated with the Association of...
For years, analysts, security specialists, and security architects alike have been encouraging organizations to become DMARC compliant. This involves deploying...