Russian Actors Behind SolarWinds Attack Hit Global Business & Government Targets
Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.
Clusters of activity associated with the attack group behind last year's supply chain breach reveal novel techniques, researchers say.
By Gnanaprakasam Pandian, Chief Product Officer and Co-Founder, Ordr As connected devices, including Internet of Things (IoT), Internet […] The…
How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… […] The…
The Jan. 6 Committee is sending subpoenas to telecom companies for private individuals' phone records.
Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is…
By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least […] The…
A new study of 17 malware frameworks shows threat actors always use USB drives to sneak malware into air-gapped environments…
Business software provider Zoho urged customers today to update their Desktop Central and Desktop Central MSP installations to the latest…
Vendors drag their heels when it comes to identifying software vulnerabilities and are often loath to expedite the fixes.
The entertainment industry has long had to deal with the challenge of protecting their high-value content and intellectual property. Enter…