Please turn on your JavaScript for this page to function normally.
Linux
How cybercriminals are using malware to target Linux-based operating systems

As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current …

chess
Why security strategies need a new perspective

After a stream of ransomware campaigns, data leaks, and attacks on critical infrastructure, businesses understand their digitization strategy needs to be complemented by a …

fire
2021 was the most prolific year on record for data breaches

Spirion released a guide which provides a detailed look at sensitive data breaches in 2021 derived from analysis conducted against the Identity Theft Resource Center (ITRC) …

healthcare
Attacks against health plans up nearly 35%

Critical Insight announced the release of a report which analyzes ​​breach data reported to the U.S. Department of Health and Human Services by healthcare organizations. As we …

bomb
Ransomware groups and APT actors laser-focused on financial services

Trellix released a report, examining cybercriminal behavior and activity related to cyber threats in the third quarter (Q3) of 2021. Among its findings, the research reports …

Biohazard
Exposed corporate credentials threatening the pharma sector

Constella Intelligence released a report which includes new and additional findings pertaining to exposures, breaches, and leakages within the pharma sector, specifically …

lock
Persistent data breaches fueling developer interest in cybersecurity

O’Reilly announced the findings of its annual platform analysis, which examines the top search terms and most-consumed content on the company’s learning platform. Interest in …

Shark
Top attack trends every organization should build resilience against

Expel announced the release of the cybersecurity trends and predictions for 2022. Based on aggregated data from its security operations center (SOC), the report provides …

danger
Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business

Vulnerability scanners are still essential tools for defenders protecting enterprise and government networks. But given the rapidly increasing complexity of today’s …

face
Number of data compromises reaching all-time high

According to an Identity Theft Resource Center (ITRC) report, the overall number of data compromises (1,862) is up more than 68 percent compared to 2020. The new record number …

ransomware
Ransomware families becoming more sophisticated with newer attack methods

Ivanti, Cyber Security Works and Cyware announced a report which identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26% increase over …

Healthcare
Healthcare industry most common victim of third-party breaches last year

Black Kite released its annual Third-Party Breach Report, which examines the impact of third-party cyber breaches in 2021. Ransomware was the most common attack method behind …

Don't miss

Cybersecurity news