Security News

According to a new CrowdStrike report, the technology, professional services, and hospitality sectors were targeted most often by cyber adversaries. The actors used a variety of novel tactics,...

Most of the attacks originated in China.

It's nearly impossible to secure supply chains from attacks like the alleged Chinese chip hack that was reported last week. But here are some tips to protect your company.

Officials Attribute BadRabbit Ransomware, WADA Breach to APT28, aka 'Fancy Bear'The British and Dutch governments have issued a strong rebuke to the Russian government over an ongoing series of...

Sophisticated groups not always so easy to pick out The growing market for commercial malware, the intermingling of state-sponsored agency's code and the blurring lines between political and...

Many of today’s massive data breaches are linked to compromised credentials belonging to remote workers, third parties, and outsourced IT contractors. While tele-work and outsourced services have...

Here's how your company can prevent common cybersecurity incidents including malware and social engineering, according to a Positive Technologies report.

ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign run by the infamous...

Some 73% of institutions took three or more days to apply patches for cyberthreats, according to a recent EfficientIP report.

WannaCry, Sony Pictures and Bangladesh Bank Attacks Tie to Suspect, FBI SaysU.S. prosecutors have accused a 34-year-old North Korean man of involvement in some of the most destructive and...