Security researchers have discovered that attackers have been using the ONI ransomware to hide an elaborate hacking campaign that targeted Japanese companies which…
Browsing: Breaches
In preparation of GDPR, it is vital that your business has a process in place to securely and responsibly dispose…
New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of businesses planning to outsource security…
Cybersecurity has dynamically evolved into a complex, ongoing threat for any company if they value their business. Cybersecurity should take…
Enterprises embracing hybrid cloud, but need better visibility and security management processes to accelerate cloud application deployment, and prevent cyberattacks…
A USB memory stick containing highly sensitive Heathrow security data, including details of the Queen’s route to the airport and her security measures,…
News broke yesterday morning that an unknown hacker hijacked Coinhive’s DNS server and replaced the legitimate Coinhive JavaScript in-browser miner with a malicious…
After a serious IT security incident is discovered, the priority is to shut it down and recover quickly in a…
A new Javelin Research study finds authentication at crossroads, password reliance continuing, and better options increasing. NuData Security commented below. Lisa…
It has been reported that the Fancy Bear hackers are racing to exploit the recently announced Adobe Flash bug. The hacking group…