RagnarLocker Ransoms Its Last Victim as Law Enforcement Takes Down its Leak Site

RagnarLocker, known for its double extortion tactic and refusal to negotiate ransom demands, has been a significant ...

Unleashing the Power of the Internet of Things and Cyber Security

Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business is conducted around ...

Another InfoStealer Enters the Field, ExelaStealer

Affected Platforms: WindowsImpacted Users: Windows usersImpact: The information collected can be used for future ...

BlackCat Climbs the Summit With a New Tactic

This post is also available in: 日本語 (Japanese) Executive Summary BlackCat operators recently announced new updates to ...

How to go from collecting risk data to actually reducing risk? – Help Net Security

Organizations trying to cope with securing their expanding attack surfaces eventually find themselves at a crossroads: ...

Clever malvertising attack uses Punycode to look like KeePass’s official website

Threat actors are known for impersonating popular brands in order to trick users. In a recent malvertising campaign, we ...

US House Panel: AI Regulation Begins With Privacy

Artificial Intelligence & Machine Learning , Governance & Risk Management , Legislation & Litigation House ...

Anticipating the benefits of a passwordless tomorrow – Help Net Security

Businesses are actively moving to eradicate passwords from employees’ lives, with 89% of IT leaders expecting passwords ...

1 545 546 547 548 549 550 551 552 553 554 555 654