Ransomware attacks have increased by 80% year-over-year
In 2022, the most prevalent ransomware trends include double-extortion, supply chain attacks, ransomware-as-a-service, ransomware rebranding, and geo-political incited …

How to build security for the metaverse
Metaverse is the virtual world where a collective comes together to communicate and interact virtually. If those involved in building the metaverse create common standards, …

RSA Conference 2022 video walkthrough
RSA Conference 2022 is taking place in San Francisco this week, and this video provides a closer look at this year’s event.

82% of CIOs believe their software supply chains are vulnerable
The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

Ransomware attacks keeping the educational sector on its toes
Financially motivated cybercriminals are taking advantage of schools’ need for uptime, their scarcity of cybersecurity defense resources, and lack of expertise compared to …

How to create awareness and mitigate data loss incidents
Nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months. The most common types of confidential and …

Turning the tables on cyber attackers
Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. In this Help …
BEC attacks have risen 53% year-over-year
Armorblox released a report which highlights the use of language-based attacks that bypass existing email security controls. The report uncovers how the continued increase in …

Healthcare-specific cybersecurity problems and how to address them
Sophisticated cyberattacks are crippling healthcare providers by posing a threat to core functions and patient privacy, according to Software Advice survey. Findings reveal …

Intelligence must drive strategic decisions
Today’s world is hyperconnected and there’s more freely available information than ever before. You would think that this would make it easier for companies to …
DDoS attackers continue to innovate, devising new threats and altering attack strategies
Corero Network Security has published the latest edition of its annual DDoS Threat Intelligence Report that compiles the trends, observations, predictions, and recommendations …

Why are many businesses still not using a password manager?
Why are we still talking about passwords? We already have single sign-on (SSO), and passwordless is the new buzzword everyone is talking about, but when you put yourself in …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025