A strong data protection strategy is essential to protect information as it moves across endpoints and in the cloud.
The company says it stopped the attack launched by a Chinese hacking group.
The drones are reportedly built with parts that can compromise organizations' data and share it on a server accessible to the Chinese government.
Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.
Still, a new Google study uncovers a bit of good news, too.
The sooner we give mindsets and tool sets equal bearing, the better. We must put SOC team members through rigorous training for emergency situations.
The old take-the-money-and-run approach has been replaced by siege tactics such as DDOS attacks and land-and-expand campaigns with multiple points of persistence and increased dwell time.
Magecart attacks continue to grow in momentum. Here are the stats and stories that show what's behind the mayhem.
The infamous Ryuk ransomware slammed a small company that makes heavy-duty vehicle alternators for government and emergency fleet. Here's what happened.
Ahead of his 2019 Black Hat USA talk, cybersecurity luminary Bruce Schneier explains why it's so important for tech experts to be actively involved in setting public policy.
A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.
Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.
Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.
Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.
Agencies must take steps to ensure that citizens trust in the security of government's digital channels.
A misconfiguration in Bluetooth Titan Security Keys' pairing protocols could compromise users under specific circumstances.
The executive order signed by President Trump bars the sale or installation of equipment seen to be controlled by hostile foreign governments and a threat to national security.
The FBI and counterparts from other nations say group infected over 41,000 computers with malware that steals banking credentials.
CISOs must consider reputation, resiliency, and regulatory impact to establish their organization's guidelines around what data matters most.