As open source code becomes more prevalent in both commercial and home-grown applications, the number of attacks based on its vulnerabilities will increase by 20 percent this year, predicted Black Duck Software, which collects...
Hospitals are under attack. A recent study by the Ponemon Institute found that half of all healthcare data breaches in the last year were the result of criminal attacks, as opposed to employee error. And the preferred method of attack
After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.
The Tuesday arrest of Giulio Occhionero and his sister, Francesca Maria, has brought to light what appears to be the biggest, and highest-profile, hacking of institutional and corporate accounts ever reported in Italy.
A large travel and leisure company wasn't looking for another point solution to add to its already noisy security environment, so they were excited to find ProtectWise, which provides real-time and retrospective threat intelligence,
Increased user awareness of phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year,...
The cyberespionage group blamed for hacking into the U.S. Democratic National Committee (DNC) has also infiltrated the Ukrainian military through a trojanized Android application used by artillery units.
We are all sick (literally) and tired of the endless rounds of 'catch the data thief' playing at a hospital near you. Since these hospital attacks begin in 2014, they seem to get worse each year. Now industry pundits are indicating...
Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data.
You could argue that ransomware (e.g., Locky and CryptoLock) is just another form of malware, but there are some critical distinctions between ransomware and the other most dangerous form of malware-what I call mal-agents used by