The Power of Policy: The Best Weapon in Your Defensive Arsenal Isn’t New Tech
By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the…
By Craig Burland,CISO of Inversion6 The default mental image of a 1970’s Ford Pinto shows a car ablaze with the…
Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have…
No organisation is an island. Last month’s attack on payroll software Zellis, reminds us how the effects of one breach…
Sebastien Raoult, a 22-year-old from France, has pleaded guilty in the U.S. District Court of Seattle to conspiracy to commit…
Air Canada, the flag carrier and the largest airline of Canada, disclosed a cyber security incident this week in which…
T-Mobile has denied suffering another data breach following Thursday night reports that a threat actor leaked a large database allegedly…
How APIs are being Targeted with Trinity Attacks By Andy Mills, VP EMEA, Cequence Security Application Programming Interfaces (APIs) are…
Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the…
This week's big news is the extortion attacks on the Caesars and MGM Las Vegas casino chains, with one having…
An affiliate of the BlackCat ransomware group, also known as APLHV, is behind the attack that disrupted MGM Resorts' operations, forcing…