Security News
![Remote Access: The Hidden Weak Spot for Cyberattacks](/static/build/img/news/alt/ransomware-stats-small.jpg)
Many of today’s massive data breaches are linked to compromised credentials belonging to remote workers, third parties, and outsourced IT contractors. While tele-work and outsourced services have...
![The 6 most popular cyberattack methods hackers use to attack your business](/static/build/img/news/alt/Phishing-small.jpg)
Here's how your company can prevent common cybersecurity incidents including malware and social engineering, according to a Positive Technologies report.
![LoJax: First-ever UEFI rootkit detected in a cyberattack](/static/build/img/news/alt/password-statistics-small.jpg)
ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax, this rootkit was part of a campaign run by the infamous...
![Why higher education is one of the worst industries at handling cyberattacks](/static/build/img/news/alt/cyberattack-stats-small.jpg)
Some 73% of institutions took three or more days to apply patches for cyberthreats, according to a recent EfficientIP report.
![Feds Charge North Korean With Devastating Cyberattacks](/static/build/img/news/alt/data-breach-stats-small.jpg)
WannaCry, Sony Pictures and Bangladesh Bank Attacks Tie to Suspect, FBI SaysU.S. prosecutors have accused a 34-year-old North Korean man of involvement in some of the most destructive and...
![Feds Charge Lone North Korean With Devastating Cyberattacks](/static/build/img/news/alt/Phishing-small.jpg)
WannaCry, Sony Pictures and Bangladesh Bank Attacks Tie to Suspect, FBI SaysU.S. prosecutors have accused a lone, 34-year-old North Korean man of involvement in some of the most destructive and...
![How US companies can defend against cyberattacks from state actors](/static/build/img/news/alt/Geopolitical-Cybersecurity-Predictions-2-small.jpg)
Cooperation between the private sector and government, says attorney and former CIA case officer Jack Rice, is the best way to protect corporate data from cyber-attacks.
![Protecting Containers From Cyberattacks](/static/build/img/news/alt/malware-statistics-2-scaled-small.jpg)
Matt Alderman of Layered Insight Delves Into Container ChallengesContainers are much different than virtual machines, posing different kinds of challenges for security, says Matt Alderman of...
![SMBs at higher risk of sophisticated cyberattacks: Here are the top threats](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Attacks including malware and cryptominers are targeting SMBs, and cybersecurity budgets can't keep up.
![US Braces for Possible Cyberattacks After Iran Sanctions](/static/build/img/news/alt/Geopolitical-Cybersecurity-Predictions-small.jpg)
The U.S. is bracing for cyberattacks Iran could launch in retaliation for the re-imposition of sanctions this week by President Donald Trump, cybersecurity and intelligence experts say. read more