Hidden Costs of a Data Breach
Don't consider just the initial costs. Hidden factors include remediation, revenue loss, reputational harm, national security — even human life.
Don't consider just the initial costs. Hidden factors include remediation, revenue loss, reputational harm, national security — even human life.
A new version of the CryptBot info stealer was seen in distribution via multiple websites that offer free downloads of…
A new malware called Xenomorph distributed through Google Play Store has infected more than 50,000 Android devices to steal banking information. [...]
The ubiquity of open source software presents a significant security risk, as it opens the door for vulnerabilities to be…
By Tom McVey, Solution Architect, Menlo Security Last year, Kaseya became the victim of the largest ransomware attack […] The…
Microsoft founder Bill Gates acknowledged that the danger of experiencing severe disease from COVID-19 has "dramatically reduced." However, he also…
Microsoft has finally started testing a new version of Task Manager with users in the Windows Insider Program. [...]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a list of free cybersecurity services and tools to help…
An Iranian-aligned hacking group tracked as TunnelVision was spotted exploiting Log4j on VMware Horizon servers to breach corporate networks in…
Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.