Cybercriminals Swap Phishing for Credential Abuse, Vuln Exploits Infection vectors were evenly divided among phishing, vulnerability exploitation, and unauthorized credential use in 2019.
Macs See More Adware, Unwanted Apps Than PCs The latest data from Malwarebytes show the average Mac sees almost twice as many bad apps as Windows systems, but actual malware continues to be scarce.
Microsoft Patches Exploited Internet Explorer Flaw This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.
Why Ransomware Will Soon Target the Cloud As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.
Keeping a Strong Security Metrics Framework Strong Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.
CIA's Secret Ownership of Crypto AG Enabled Extensive Espionage Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.
Healthcare Ransomware Damage Passes $157M Since 2016 Researchers found the total cost far exceeded the amount of ransom paid to attackers.