
What we know about SafePay, the Ingram Micro attackers
It sounds like a banking app, but instead, it's one of the latest ransomware groups: SafePay. Who are the per...
It sounds like a banking app, but instead, it's one of the latest ransomware groups: SafePay. Who are the per...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Security researcher John Wethington found a database of a smart city that could be accessed via the internet w...
Hundreds of developers have fallen victim to a hacker who has cleared out the Git source repositories and repl...
Cisco has announced that its Nexus 9000 fabric switches have a critical error, allowing anyone to remotely con...
The German, Dutch, Romanian and American police, together with Europol, are said to have confiscated the serve...
Researchers at Barracuda Networks have detected a large increase in account takeovers. In March, 29 percent of...
Research by Fortinet shows that 74 percent of managers of operational technology (OT) in the industry have had...
A botnet used to steal money from the Electrum bitcoin wallet network continues to grow. According to research...
Crypto criminals and fraudsters stole over $1.2 billion in the first quarter of 2019. That suggests cryptocurr...
A new form of cryptomining malware uses hacking codes from the US National Security Agency (NSA). The malware ...
Smartphones running Android 7.0 or higher can now be used as two-step verification (2FA) tools as part of Goog...