New research from the BCI has revealed substantial differences among organizations when it comes to response times following a cyber-breach
World-Check Terror Blacklist Leaked Online
Database used by banks and governments found on public internet
Malware’s Role: Wildly Overstated as an Info-Stealing Tool
99% of post-intrusion cyberattack activities use standard networking and IT tools.
Official UEFA Euro 2016 App Leaks User Data
User names, passwords, addresses and phone numbers are being transferred over an insecure internet connection.
9.2 Million More US Healthcare Records Go Up for Sale on the Dark Web
The plaintext 2GB database has names, addresses, emails, phone numbers, dates of birth and Social Security Numbers (SSNs).
Data Left Behind on Two-Thirds of Drives Sold on eBay
New research reveals lapses in data deletion best practice
DDoS Attack Powered by 25,000 CCTV Cameras
Internet of Things hijacked for attack on small biz
Bangladesh Bank Parts Company with Mandiant – Report
Security firm had not yet completed its investigation