Please turn on your JavaScript for this page to function normally.
defend
Number of lost, stolen or compromised records increased by 164%

According to Gemalto’s Breach Level Index, 918 data breaches led to 1.9 billion data records being compromised worldwide in the first half of 2017. Compared to the last …

danger
Cybercriminals deploying assortment of banking Trojans and ransomware

Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …

user-targeted threats
User-targeted threats at all-time high despite rising education spend

The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’s priority list. Yet …

Equifax
Equifax breach: Sensitive info, SSNs of 44% of U.S. consumers accessed by attackers

Equifax, one of the three largest American credit agencies, has announced that it has suffered a “cybersecurity incident” affecting some 143 million U.S. …

IoT
13% of SMBs have experienced an IoT-based attack

One in four companies have already experienced a ransomware attack and one in eight have dealt with an IoT-based attack, according to Arctic Wolf Networks. As mid-market …

road
Emerging threats fuel public threat intelligence sharing

Concerns around emerging threats such as ransomware and polymorphic malware have sparked a significant increase in collaboration by the cyber security industry, according to …

bomb
Another Ukrainian software maker’s site compromised to spread malware

The web server of Crystal Finance Millennium, a Ukraine-based accounting software firm, has been compromised and made to host different types of malware. The discovery of the …

email
Global DMARC adoption still slow, it’s open season for phishers

92 percent of U.S. Fortune 500 companies have left their customers, partners and brand names vulnerable to domain name spoofing, one of the most common digital deception …

biohazard
Attackers turn to auto-updating links instead of macros to deliver malware

SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is made to automatically download an additional malicious RTF file, ultimately …

question
Motivation roulette: Is pseudo-ransomware a term?

It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to …

Tor browser
FBI unmasks Tor-using suspected sextortionist

A California man that stands accused of sextortion, producing child pornography, and threats of mass violence has been identified by the FBI through the use of a so-called …

HBO
HBO hackers demand money, leak more stolen data and GoT scripts

The hackers who’ve breached HBO and supposedly made off with 1.5TB of the company’s data have released a second data dump. According to the Associated Press and …

Don't miss

Cybersecurity news