Loading...
The day's top cybersecurity news and in-depth coverage
January 06, 2021
If you can perform these tasks on your Windows network, then you are properly prepared to respond to a nation-state attack like SolarWinds. Read more â¶
Email attacks are getting more sophisticated, impersonating your colleagues and trusted contacts. Cyber AI can tell friend from foe, stopping the most convincing malicious emails in their tracks.
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
Egregor is one of the most rapidly growing ransomware families. It employs "double ransom" techniques to threaten reputational damage and increase pressure to pay.
Where can you find an attorney with the knowledge and insight to help you navigate thorny privacy and security issues? These five questions will help you find the right match.
Hiding sensitive data in a sea of noise might have more value than encryption in some use cases. Here are the most likely differential privacy applications and their trade-offs.
Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.
© 2024