News

  • Estonian Gets 66 Months for Ransomware Conspiracy

    Man worked for DirectConnection cybercrime forum Read More

    Read More

  • Formulating proper data destruction policies to reduce data breach risks

    This blog was written by an independent guest blogger. As Morgan Stanley Bank now knows, ignoring certified data destruction policies can be disastrous. The bank made news in 2020 when it was fined over $60 million for not using proper oversight when decommissioning two of its data centers. Regulators found that the organization had not…

    Read More

  • Use zero trust to fight network technical debt

    Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls. Read More

    Read More

  • Ransomware Attacks Soar by 100% in 2021

    Reports to ICO top 600 in just a year Read More

    Read More

  • 5 old social engineering tricks employees still fall for, and 4 new gotchas

    Blame it on pandemic fatigue, remote work or just too much information, but employees appear to be lowering their guard when it comes to detecting social engineering tricks. Attackers were more successful with their social engineering schemes last year than they were a year earlier, according to Proofpoint. More than 80% of organizations suffered a…

    Read More

  • What can March Madness and 538 teach us about cybersecurity risk?

    I love this time of year, with March Madness excitement in the air and my Notre Dame Fighting Irish still in the tournament (as of the writing of this column)! More importantly – yes, more importantly – I love monitoring the 538 March Madness prediction website to see how the chances of winning change through…

    Read More

  • One in 10 UK Staff Circumvent Corporate Security

    Cisco warns of awareness gap among hybrid workers Read More

    Read More

  • Man-in-the-middle (MitM) attack definition and examples

    What is a man-in-the-middle-attack? A man-in-the-middle (MitM) attack is a type of cyberattack in which communications between two parties is intercepted, often to steal login credentials or personal information, spy on victims, sabotage communications, or corrupt data. “MitM attacks are attacks where the attacker is actually sitting between the victim and a legitimate host the…

    Read More

  • Friday Squid Blogging: Unexpectedly Low Squid Population in the Arctic

    Research: Abstract: The retreating ice cover of the Central Arctic Ocean (CAO) fuels speculations on future fisheries. However, very little is known about the existence of harvestable fish stocks in this 3.3 million­–square kilometer ecosystem around the North Pole. Crossing the Eurasian Basin, we documented an uninterrupted 3170-kilometer-long deep scattering layer (DSL) with zooplankton and…

    Read More

  • Optimistic father of LAPSUS$ hacking suspect says he’s going to try to stop him using computers

    British police arrested seven people earlier this week in relation to a wave of attacks launched by the LAPSUS$ hacking group, against firms such as Microsoft, NVIDIA, Ubisoft, Samsung, and Okta. The hacking group’s alleged mastermind? A 16-year-old boy from Oxford, UK. Read More

    Read More