Beyond the pandemic: Why are data breach costs at an all‑time high?
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
The man was after sexually explicit photos and videos that he would then share online or store in his own collection
The caches of data that were publicly accessible included names, email addresses and social security numbers
Meet SparklingGoblin, a member of the Winnti family
Who is actually paying the ransom demand? – Be careful about what you throw away – Records from a terrorist watchlist exposed online
Japanese cryptocurrency exchange Liquid suspends cryptocurrency deposits and withdrawals and moves its assets into cold storage
Ransomware payments may have greater implications than you thought – and not just for the companies that paid up
Fraudsters impersonate vaccine manufacturers and authorities overseeing vaccine distribution efforts, INTERPOL warns
The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication
One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin
How IISpy spies on its victims and stays under the radar – IISerpent tampers with search engine results – How to avoid falling prey to ransomware
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites
As deepfakes become indistinguishable from reality and the potential for the misuse of synthetic content is virtually endless, what can you do to avoid falling victim to deepfake fraud?
A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim
How poking at the innards of satellites can make the future of cybersecurity in space more palatable
The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers
ESET research dissects IIS web server threats – How IIStealer steals credit card data – The flood of spam in your inbox
Why companies and their security teams need to engage with a lawyer before an incident occurs
Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?