Discover the best ways to mitigate your organization's attack surface, in order to maximize cybersecurity.
The university suffered a ransomware attack; however, there is no evidence so far of data being accessed or stolen.
The federal agency urges organizations to ditch the bad practice and instead use multi-factor authentication methods
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
Why companies and their security teams need to engage with a lawyer before an incident occurs
How is Black Hat USA 2021 different from the past editions of the conference and what are the themes may steal the show this year?
Twitter’s transparency report revealed that users aren’t quick to adopt 2FA and once they do enable it, they choose the least secure option
With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation.
Cybercriminals may target the popular event with ransomware, phishing, or DDoS attacks in a bid to increase their notoriety or make money
From securing your devices to avoiding public Wi-Fi hotspots for logging into apps, we look at measures you can take to remain safe this holiday season
If you'll be watching Sports Streaming events on your SmartTV, laptop, tablet or cell phone, learn the tips to keep you and your personal data safe.
What was it like to work for, and be friends with, the technology entrepreneur back when he helped shape the computer security industry?
What does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?
OSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space
The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals
The report provides unique insights into how the COVID-19 pandemic affected the data breach landscape
We will explore two threats – Android stalkerware and XP exploits
The Patch Tuesday security update due in July should hammer the last nail in the coffin of Adobe Flash Player