The data shows that in 2020, almost half of all global ransomware attacks were targeted towards municipalities. Even with limited budgets and resources available, there are still many resource-efficient measurements they can take to protect themselves.
$1.3 million BEC attacks on three large financial services companies in U.K. and Israel shows how far cyber criminals are willing to go and what they are capable of.
Source code leak of software belonging to over 50 high profile companies was made available online due to misconfiguration of their software development platforms.
Intelligent chatbots are growing in popularity as they can reduce potential system vulnerabilities by funneling communications through highly secure protocols.
Mercedes-Benz's source code leak for smart car components may have given software developers and hackers access to the German automaker's most lucrative intellectual assets.
Verizon's annual mobile security report paints a picture of a landscape increasingly dependent on mobile devices to get work done, this pattern has been driven primarily by the pandemic conditions.
The US Cyber Command is expecting the TrickBot botnet to be involved in election interference attempts, and is actively running persistent operations against it along with Microsoft.
SolarWinds hackers suspected to have breached email security provider Mimecast compromising its Microsoft 365 Exchange connection certificate, and affecting 10% of its customers.
Is your vulnerability management team overwhelmed and demoralized by the need to play catch up with a ceaseless flood of vulnerabilities? Using security intelligence can enable risk-prioritized vulnerability management.