NCSC reveals Sandworm hackers may have been planning sabotage
2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been “ringing off the hook” since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, ba…
Cyber-Attack on Mississippi Schools Costs $300,000
Board of Yazoo County School District votes to pay company $300,000 to recover files encrypted by threat actors
Instagram’s Handling of Children’s Data Under Investigation
EU’s leading GDPR regulator investigates Instagram for allegedly failing to protect children’s data
Waze Vulnerability Lets Attackers Track and Identify Users
Flaw in traffic-dodging app allows threat actors to track users and find out where they are going
Attacks on WAFs Triple in Size as Ransom Demands Re-Emerge
Large attacks on web application firewalls re-emerge in 2020
Government Spooks Urge Firms to Patch SharePoint Bug
CVE-2020-16952 is critical RCE flaw, says NCSC
US CEO Charged with $2bn Tax Evasion Scheme
Robert Brockman also accused of defrauding investors
Google Reveals it Was Hit by 2.5Tbps DDoS
Largest ever attack to date came in 2017, tech giant reveals
Can Edge Computing Exist Without the Edge? Part 1: The Edge
If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the “edge” and combine it with “computing” you get edge computing. But if you have been reading headlines, you would be justified…