New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom
Another US city was the victim of a ransomware attack, this time crooks hit the city of New Bedford, Massachusetts, asking for $5.3 Million Ransom, but… The systems of New…
Have You Asked your eDiscovery Vendor
These 6 Essential Data Security Questions? By Brian Schrader, Esq., president, and CEO, BIA In today’s world of ever-increasing data theft, network hacks and other cyber threats, companies of all…
Top 5 Questions about the Capital One Data Breach
By Ilia Sotnikov, Vice President of Product Management, Netwrix Data breaches that affect financial institutions always become hot topics to discuss. The recent hack at financial giant and credit card…
Expert found Russia’s SORM surveillance equipment leaking user data
A Russian security researcher has found that hardware wiretapping equipment composing Russia’s SORM surveillance system had been leaking user data. The Russian researcher Leonid Evdokimov has found that hardware wiretapping…
August Patch Tuesday
Take Advantage of Your August Patch Tuesday Break By Chris Goettl, Director of Product Management, Security, Ivanti August Patch Tuesday was a pleasant relief after the massive release of updates…
Adhere to Cyber Security Solutions to Protect Your System from a Diverse Range of Issues
By Pratik Kirve, Sr. Specialist – Content Writer, Allied Analytics Irrespective of the kind of business you are running, the importance of digital systems and the Internet for your daily…
Anatomy of a Single Request Attack: The #1 Invisible Security Threat
By Kevin Gosschalk, CEO and Cofounder, Arkose Labs Hackers are employing a new type of attack that has quickly become the scourge of network cybersecurity systems, getting around even advanced…
Better Safe than Sorry: How to Protect Yourself While Shopping Online
By Bailey Newman, Content Team, CouponChief.com We may think nothing of filling out forms and providing data to eCommerce sites, social media sites, and public forums, but thieves and swindlers…
Advanced Malware Detection – Signatures vs. Behavior Analysis
By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it…
NK is the new Iraq?
By Rodrigo Ruiz Referring to the television series Orange is the new black, I can not but consider it very convenient to blame the North Koreans for the worldwide incident…
Trump’s Cyber security Executive Order: A Promising Start to Securing Digital Infrastructure…But Don’t Forget What’s Beyond the Firewall
By Lou Manousos, CEO, RiskIQ After some high-profile cyberattacks and information breaches, the cybersecurity posture of the U.S. government has never been more front and center in the public consciousness….
Lazarus: Data Leakage With Cryptographic System
By Rodrigo Ruiz & Rogério Winter You have most probably already received the recommendation or even the imposition of keeping a “strong password” in your applications. A strong password is…