IoT vulnerabilty disclosure platform will enable vendors and researchers to resolve flaws
Orgs Struggling to Secure SaaS Applications Following Shift to the Cloud
Two-thirds of IT pros have less time to secure SaaS applications
Modern Attacks Include Supply Chain “Hopping” and Reversing Agile Environments
Modern attacks use supply chain island hopping and target digitally transformed businesses
Albion Online Forum Breach Exposes User Info
Admins says hacker got hold of emails and hashed passwords
#InfosecurityOnline: The Role of Data in Predicting Human Behaviors
How far can data go in identifying, understanding and predicting human behaviors?
US Indicts GRU Officers for NotPetya, Olympics Attacks and More
DoJ lists Sandworm team’s destructive attacks since 2015
UK: Russian GRU Hackers Targeted Tokyo Olympics
NCSC reveals Sandworm hackers may have been planning sabotage
2020 DDoS Extortion Campaign — A Sequel More Thrilling Than the Original
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been “ringing off the hook” since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, ba…
Cyber-Attack on Mississippi Schools Costs $300,000
Board of Yazoo County School District votes to pay company $300,000 to recover files encrypted by threat actors
Instagram’s Handling of Children’s Data Under Investigation
EU’s leading GDPR regulator investigates Instagram for allegedly failing to protect children’s data