Security News > 2022 > May > Why do hackers keep coming back to attack you? Because they can

Hackers have a tendency to return to the scene of their crimes over and over again.
If you want to fast forward your data security policy you should join our upcoming webinar, Your best defence against cyber attacks is an Iron Man suit for your data, on June 8th at 9am PT. Our own Martin Courtney will be joined by Rubrik's Murthy Mathiprakasam to discuss how, when it comes to protecting data, some heroes don't wear capes.
They'll unpick the challenges companies face in protecting, tracking and auditing the ever-growing mountain of data they need to collect, store and process both on and off-prem.
They'll also discuss how quickly restoring access to applications, systems AND data is essential to being able to recover from a cyberattack, and limit both operational and reputational damage.
They'll dive into how Rubrik's data observability engine can map and monitor your sensitive data to flag up vulnerabilities and keep in line with governance and regulatory requirements.
Let's face it, it's easier that pulling on that Iron Man suit.
News URL
https://go.theregister.com/feed/www.theregister.com/2022/05/24/why_do_hackers_keep_coming/
Related news
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)