Administrator of 911 S5 botnet arrested, botnet dismantled Security Staff June 4, 2024 A coordinated international operation had led to the apprehension of the alleged 911 S5 botnet administrator. Read More
39% of MSPs adapting to new technologies is their biggest challenge Jordyn Alger June 4, 2024 39% of MSPs state that their greatest challenge is keeping up with emerging cybersecurity solutions and technologies. Read More
49% of organizations feel somewhat prepared to handle a breach Security Staff June 3, 2024 A report found that insufficient or ineffective cybersecurity training and resources are the two biggest items missing from a cybersecurity approach.Read More
A new malicious email campaign uses piano-themed scams to lure targets Security Staff June 3, 2024 Piano-themed messages are being sent to lure targets into falling for an email scam. Read More
Defeating current DNS-based attacks Will Strafach June 3, 2024 Domain name systems (DNS) has been undergirding the internet for more than four decades — and still it’s a daily pathway for cyberattacks.Read More
Research discovers the 25 most hacked pop culture passwords Security Staff June 3, 2024 New research reveals the most hacked pop culture passwords in 2024. Read More
Security leaders respond to the cyberattack on Christie’s Jordyn Alger June 3, 2024 Security leaders respond to the claim that a ransomware group has accessed the data of at least 500,000 of Christie’s customers globally. Read More
With the exponential growth of data, new SEC rules need a new approach Pranava Adduri May 31, 2024 In an era of increasing cyber threats and exponential data growth, it’s imperative that organizations understand how currently data security solutions are falling short. Read More
An intelligent application future hinges on using responsible AI Lexy Kassan May 31, 2024 As enthusiasm for AI builds and regulation gains momentum, investing in AI responsibly is not just the right thing to do — it’s competitive. Read More
Living off the land in a victim’s network Matt Malarkey May 31, 2024 Despite sophisticated threat and detection tools, cyber adversaries have proven that they are able to maintain a presence on a victim’s network. Read More