Ransomware gangs extort victims 17 hours after intrusion on average
Ransomware gangs are operating much more quickly than before, leaving less time for organizations to detect […]
																		How to evaluate and mitigate risks to the global supply chain
Enterprise security leaders face mounting pressure to protect their global IT supply chains against threat actors […]
																		CISO success story: How LA County trains (and retrains) workers to fight phishing
It cost neighboring San Bernardino County $1.1 million to resolve a ransomware attack on its sheriff’s […]
																		Palo Alto Networks firewall bug being exploited by threat actors: Report
Admins with firewalls from Palo Alto Networks should make sure the devices are fully patched and […]
Як залишати корисні відгуки про компанії та чому це важливо?
Відгуки відіграють ключову роль у формуванні репутації компаній та допомагають іншим користувачам приймати обґрунтовані рішення. Але […]
																		Hacker attackieren Bundeswehr-Universität
Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten […]
																		whoAMI name confusion attacks can expose AWS accounts to malicious code execution
Thousands of active AWS accounts are vulnerable to a cloud image name confusion attack that could […]
																		Razzia gegen Telefonbetrüger
Über Callcenter haben Kriminelle einen Schaden in zweistelliger Millionenhöhe angerichtet. chainarong06 – shutterstock.com Der Polizei ist […]
																		What is anomaly detection? Behavior-based analysis for cyber threats
Anomaly detection is an analytic process for identifying points of data or events that deviate significantly […]
																		PostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacks
Attackers who exploited a zero-day vulnerability in BeyondTrust Privileged Remote Access and Remote Support products in […]