Why North Korea Excels in Cybercrime
January 22 2021North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
Read moreDreamBus, FreakOut Botnets Pose New Threat to Linux Systems
January 21 2021Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.
Read moreBreach Data Shows Attackers Switched Gears in 2020
January 21 2021Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.
Read moreAttackers Leave Stolen Credentials Searchable on Google
January 21 2021Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.
Read moreCloud Jacking: The Bold New World of Enterprise Cybersecurity
January 21 2021Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.
Read more7 Steps to Secure a WordPress Site
January 21 2021Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.
Read moreHacker Pig Latin: A Base64 Primer for Security Analysts
January 21 2021The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's...
Read moreRethinking IoT Security: It’s Not About the Devices
January 21 2021Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.
Read more
Recent Comments