BACKGROUND: New research from Sophos Labs details how a new threat actor group called Atom Silo was found to have…
Browsing: Threat Intelligence
ABOUT This ‘Surviving Ransomware’ document is intended to raise the awareness of the threats posed by the digital dangers presented…
Being certain that most readers will have noticed the levels of successful cyber-attacks carried out against public services such as…
HP Wolf Security has just released the findings of a global survey of 1,100 IT decision-makers (ITDMs), examining their concerns…
Scrutiny over data protection and privacy, and the reporting and analysis behind a powerful threat defense, is moving to the…
BACKGROUND: The actor “m1Geelka” shared a link to a RAR archive containing manuals and tools allegedly provided to actors distributing…
A recent cyberattack targeting the world’s largest meat processor, JBS, points to a disturbing new reality: our nations’ critical infrastructures…
DeadRinger Research Highlights Attack Trends Leveraging Third-Party Service Providers to Compromise Multiple Targets Cybereason, the leader in operation-centric attack protection,…
An independent study of significant cyber events worldwide, based on historical attacks documented by the Center for Strategic and International…
Looking back at cyber-attacks over the last quarter, Colonial Pipeline easily holds the beacon for the incident that prompted the…