Source
DARKReading
Implement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and employees' devices secure.
In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
Verizon's "2022 Data Breach Investigations Report" repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
But there was a substantial drop in the overall number of critical vulnerabilities that the company disclosed last year, new analysis shows.
Notable new infection chain uses PDF to embed malicious files, load remote exploits, shellcode encryption, and more, new research shows.
Decentralized finance lost $1.8 billion to cyberattacks last year — and 80% of those events were the result of vulnerable code, analysts say.
As states address privacy with ad-hoc laws, corporate compliance teams try to balance yet another set of similar but diverging requirements.