Reshaping the future of transportation with the ITS World Congress
The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As more and more organizations look to digital tech to transform their operations,…
Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure of the negotiation with the victim. In June, hackers have…
How to Accelerate SecOps efficiency and extend capabilities with XDR
By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every…
Taking Back Control of Today’s Software Supply Chain
By Jasmine Noel, Senior Product Marketing Manager, ReversingLabs Supply chains are under attack. Malicious actors perpetrating these breaches will continue to succeed until security teams abandon common myths and misconceptions…
No, You Don’t Need
By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To…
Cloud Security Automation: The Fastest Path to Zero Trust
By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and…
The Silver Bullet for Ransomware’s Golden Goose
Ransomware is a hugely profitable business. The only way to end it is to stop criminals from making money off your data. By Elliot Lewis, Co-founder, and CEO of Keyavi Data Corp….
LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers from MalwareHunterTeam and BleepingComputer, along with the malware expert Vitali Kremez…
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today…
No More Ransom helped ransomware victims to save almost €1B
The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for free saving almost €1 billion in payments. No More Ransom…
XCSSET MacOS malware targets Telegram, Google Chrome data and more
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and Google Chrome. Security researchers from Trend Micro continues to monitor…
Takeaways from The Oldsmar Water Attack & What Security Leaders Can Do About It
With Real Examples & Screenshots of Cyber Attacks on Water & Wastewater Facilities By Michael Yehoshua, VP of Global Marketing, SCADAfence Over the last few months, cybersecurity journalists and the…