The SolarWinds hackers are back again, this time leveraging the stolen email account of a United States federal agency to run a phishing campaign against 150 government entities in 24 countries.
New study finds multi-cloud security to be the biggest IT challenge for businesses as the authorization and authentication handoffs between the different services provide opportunity for things to go wrong.
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
2021 was the year of ransomware, with attacks almost doubling in 2020. Cyber insurance providers, reeling from an historic couple of years, are maturing their qualification processes and raising the bar for pay-outs, so businesses can no longer rely on insurance alone as a protection and recovery strategy.
Report focuses on what open source software is most commonly deployed in both private and public organizations, with an eye toward better evaluating potential vulnerabilities and where security support should be concentrated.
As part of a Digital New Deal, cybersecurity bootcamps will play a pivotal role in improving the earning potential of professionals in a space that is desperately looking to fill roles.
Verizon Visible experienced an attack recently that saw customer accounts taken over and orders placed using stored payment information. Verizon has verified that the hacked accounts were compromised by a credential stuffing campaign.
Compromised data belonging to ten companies is on sale on the dark web by a hacking group called ShinyHunters. The 73 million stolen user records is being sold for $18,000.
DreamHost database leak exposed nearly 815 million records of customer data from the WordPress hosting platform. User account and configuration information was exposed.