Preparing Microsoft cloud networks for regional disruptions
We live in an always-on world of 24/7 websites, servers, help desks and internet connectivity—that is, until it’s not connected. The Ukrainian crisis shows that...
Top tools and best practices for WordPress security
If you run a WordPress website, you need to get serious about keeping it as secure as possible. WordPress continues to be a widespread target...
SentinelOne to buy Attivo Networks for $617M, bringing ID-based security to XDR platform
In a move designed to bolster its XDR (extended detection and response) platform, Singularity, to defend against the latest cybersecurity threats, endpoint security vendor SentinelOne...
UK Blocks Assange’s Extradition Appeal
WikiLeaks founder’s appeal against extradition to US refused by UK Supreme Court Read More
Webroot files patent infringement claim against Trend Micro
Security endpoint protection vendor Webroot has filed a patent infringement complaint against competitor Trend Micro accusing it of implementing patented technology in its security software...
Hackers Hit Rosneft
Cyber-attack on German subsidiary of Russian state-backed energy company Read More
Nearly 300k Heart Patients’ Data Exposed
PHI of 287K patients at risk after cyber-attack on South Denver Cardiology Associates Read More
NVIDIA staff shouldn’t have chosen passwords like these…
Last month, the LAPSUS$ hacking group stole up to one terabyte of internal data, including hashed passwords, from graphics card maker NVIDIA. Of course, you...
Lawmakers Probe Early Release of Top RU Cybercrook
Aleksei Burkov, seated second from right, attends a hearing in Jerusalem in 2015. Image: Andrei Shirokov / Tass via Getty Images. Aleksei Burkov, a cybercriminal...
What Is a Crypto Wallet and How to Keep Your Wallet Secure?
A-list celebrities and social media influencers are now adding their voices to the roar of other cryptocurrency fans asking you to join them in the...