Security News

Life After WannaCry and NotPetya: Europol Wants EU Member States To Be ReadyLife after WannaCry and NotPetya: Europol, the EU's law enforcement intelligence agency, wants member states to be able...

Threatpost talks to Phil Neray with CyberX about Tuesday's ransomware attack on aluminum producer Norsk Hydro, and how it compares to past manufacturing attacks like Triton, WannaCry and more.

One of the world's biggest aluminium producers, Norway's Norsk Hydro, said Tuesday it had been hit by a cyber-attack of unknown origin. "Hydro became victim of an extensive cyberattack in the...

Europol on Monday announced the adoption of a new protocol for how law enforcement authorities in the European Union and beyond will respond to major cross-border cyberattacks. read more

U.S. Senators Ron Wyden and Tom Cotton believe all senators should receive information on successful cyberattacks aimed at the Senate. read more

Cyberattacks from Russia, China, North Korea and Iran are increasingly sophisticated and, until recently, were done with little concern for the consequences, the top Pentagon cyber leaders told a...

IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else, according to the 7 Uncomfortable Truths of Endpoint Security survey by Sophos....

A new report outlines the cyberattacks and threats that financial firms are facing.

More than half (51%) of respondents said their security teams spend more time on manual processes than handling vulnerabilities, according to a Tenable and Ponemon report.

Moody's Says Hospitals, Banks Among Those That Have the Most Significant Potential ImpactFour business sectors - hospitals, banks, securities firms and market infrastructure providers -...