The education sector is an extremely underserved cybersecurity market. It is past time to draw attention to an ongoing and very serious problem facing the US education system: our schools are ill-equipped to face the mounting threats posed by hackers.
With successful defenses against ransomware, and since cryptojacking has become less profitable with cryptocurrencies’ fall in value, formjacking has become the new avenue for online criminal activity. It’s easy to do, it’s scalable, and it’s hard to stop.
According to a new report from security research firm Symantec, cyber criminals and other hacker syndicates are carrying out “formjacking” attacks at an increasing rate, making it one of the fastest growing forms of cyber attacks on the Internet right now.
The annual ENISA threat landscape report is one of the most helpful tools for keeping a finger on the pulse of current trends in cyber threats. This year's report highlights the dramatic rise in denial of service and cryptojacking attacks.
A fundamental shift from defensive to offensive cyber operations is now underway in order to deter cyber attacks, and the United States and its European ally France are at the forefront of this trend.
WEF2019 global risk report has named cyber attacks and data breaches as the fourth and fifth most serious risks facing the world, and will do more damage than man-made environmental disasters.
A major cyber attack on South Korea is usually not a stop-the-presses global news item; it's fairly routine for North Korea and China to make attempts. But what's interesting are the organizational failures that this cyber attack highlights.
Bloomberg reported that Chinese spies planted a grain-sized microchip in motherboards supplied to server manufacturers in an alleged supply chain attack. What are the lessons for enterprises?
Know your VMs from your containers and unikernels in your software infrastructure? Containers may not be as secure as you think and unikernels may offer more speed and security at less cost.
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks.