Ransomware attack disrupted store operations in the Netherlands and Germany
Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail giant MediaMarkt was a victim of a ransomware attack that forced…
New Magecart group uses an e-Skimmer that avoids VMs and sandboxes
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have spotted a new Magecart group that uses a browser script…
NATO releases its first strategy for Artificial Intelligence
This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in a responsible manner. Artificial Intelligence (AI) is changing the global…
Protecting SMBs from Current Cybersecurity Threats
A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If you own a small or medium-sized business, you are a target of…
Modern Times, Old Prejudices
The Hacker Era By Jordan Marcus Bonagura The century of constant acceleration Twenty-first century, more than a century of human evolution and great changes, a century of constant acceleration. Everything…
Twitch data breach updates: login credentials or card numbers not exposed
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous 4chan user has published…
Source Code Protection Market
Do we need GitHub and Bitbucket backup software? By Marta Przybylska, Marketing Manager, GitProtect.io / Xopero Software Today, the software is the driving force of the world, and developers are…
New CIOs: 5 Key Steps in Your First 100 Days
Getting the first 100 days right is critical to achieving momentum, credibility, and long-term success. By Etay Maor, Senior Director, Security Strategy, Cato Networks Starting off as a new CIO…
Revil ransomware operators are targeting new victims
Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can confirm that they hit new victims. On September 7, the servers of…
The Importance of Multi-Factor Authentication and Strong Passwords
Understanding and implementing MFA and strong password protocol. By Jeff Severino, CyberLock Defense, Lockton Affinity The importance of multi-factor authentication and password security is critical. Often, it is your best…
The Future of Cybersecurity? Just One Word: Automation
By Dr. Peter Stephenson If you are not better informed, smarter, better equipped, and faster than the adversary, you can count on your system being compromised at some point. When…
Trust Not in Third-Parties
You aren’t on your own in cybersecurity, but you should act like you are By Gregory Hoffer, CEO, Coviant Software Cybersecurity management is a dynamic process. There is no “set…