Connected technology companies will be expected to integrate a string of tough security measures into their devices under new government…
Browsing: Threat Intelligence
Threat intelligence is a category of intelligence that focuses on information security. As defined by Gartner, it is “evidence-based knowledge…about…
Following the news NIS America hacked: Customer payment card data stolen, $5 off next purchase offered as apology gift, perspective from…
The most interesting trend to surface in Q4 of RiskIQ’s phishing report was a 100 percent increase in phishing campaigns…
Bill Gates, one of the world’s richest men and a pioneer of computing for the masses, has hit out at cryptocurrency,…
It has been reported that a newly uncovered form of Android malware called RedDrop has the ability to steal critical…
News broke yesterday that researchers identified a new ransomware, Thanatos. When this ransomware infects a victim, it uses a new key…
An advertising network is hiding in-browser cryptocurrency miners (cryptojacking scripts) in the ads it serves on customer sites, and has been doing…
According to a new report to be released on Monday by CrowdStrike, there is a leveling of the playing field between nation-states…
The Colorado Department of Transportation (DOT) has shut down over 2,000 computers after some systems got infected with the SamSam ransomware on…