New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom

Another US city was the victim of a ransomware attack, this time crooks hit the city of New Bedford, Massachusetts, asking for $5.3 Million Ransom, but… The systems of New […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on New Bedford city infected with Ryuk ransomware, but did not pay $5.3M ransom

XKCD forum data breach impacted 562,000 subscribers

The popular webcomic platform XKCD has suffered a data breach that exposed data of its forum users, the incident impacted 562,000 subscribers. XKCD is one of the most popular webcomic […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on XKCD forum data breach impacted 562,000 subscribers

Artificial Intelligence-Driven Situational Awareness

By Milica D. Djekic Once you get into the new environment you would begin digging in the darkness trying to figure out what is happening there. Maybe you would cope […]

Posted in Cyber Security News, Featured | Tagged , , , , | Comments Off on Artificial Intelligence-Driven Situational Awareness

US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf

The United States cyber army carried out a cyberattack in June on a database used by Iran’s Islamic Revolutionary Guard Corps to plot attacks on oil tankers in the Gulf. […]

Posted in Cyber Security News | Tagged , , , , | Comments Off on US cyberattack temporarily paralyzed the ability of Iran to target oil tankers in the Gulf

Expert found Russia’s SORM surveillance equipment leaking user data

A Russian security researcher has found that hardware wiretapping equipment composing Russia’s SORM surveillance system had been leaking user data. The Russian researcher Leonid Evdokimov has found that hardware wiretapping […]

Posted in Cyber Security News | Tagged , , , , , , , , | Comments Off on Expert found Russia’s SORM surveillance equipment leaking user data

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account has been subject to spam. It happens so quickly, one day you get that first piece of unsolicited email and then the next you’re being […]

Posted in Cyber Security News | Tagged , , , , , , | Comments Off on 7 Steps to Protect Yourself Against Corporate Spear Phishing

Advanced Malware Detection – Signatures vs. Behavior Analysis

By John Cloonan, Director of Products, Lastline, Inc. Malware has threatened our computers, networks, and infrastructures since the eighties. It is constantly evolving, and deploying products that effectively detect it […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , | Comments Off on Advanced Malware Detection – Signatures vs. Behavior Analysis

Multi-Factor Authentication and Mobile Devices

Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , | Comments Off on Multi-Factor Authentication and Mobile Devices

Veiled Vulnerability

AD By Charles Parker, II In this day, there are vulnerabilities throughout the environment. These are blatant with malicious websites and more camouflaged as with phishing and ransomware. With another […]

Posted in Cyber Security News | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Veiled Vulnerability

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X