The threat landscape is constantly evolving, but often, it’s the same old tricks that pay off. In the past several months, we’ve been seeing…
Data Breach
-
-
Insider risk management provider Code42 has launched an update to its Incydr data protection that can now detect the source and destination of proprietary…
-
Anyone in cybersecurity who has had to deal with vulnerabilities in technology systems has inevitably run into the Common Vulnerability Scoring System (CVSS). Whether…
-
Data BreachNewsSecurity
VEC campaign targets critical infrastructure firms with invoice fraud attack
New research from email security vendor Abnormal Security has revealed how a single threat actor was able to compromise five different vendor email accounts.…
-
A suspected senior member of the hacker group OPERA1ER has been arrested in Operation Nervone conducted jointly by multiple international law enforcement agencies, Interpol…
-
Data BreachNewsSecurity
Priorities in preparing for a ransomware attack: people, processes, and technology
Even though ransomware has existed for decades, this ever-evolving threat continues to be extremely effective, and it’s not going away anytime soon. According to…