The passive Grasshopper should be more like the Ants, who use IBM Resilient to support their robust and comprehensive incident response plan.
Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.
Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
CCleaner was compromised at the main distribution site to include a malware attack. The Floxif attack is a downloader that breached the app supply chain.
With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
An attack doesn't need a special file to be malicious; it can use previously existing system structures, prompting the need for new security tools.
Financial cybersecurity is more important than ever, according to a recent survey. Two-thirds of respondents reported suffering an attack in the past year.
Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.
Domain name provider Dyn suffered the largest DDoS attack in history on Oct. 21. DDoS is nothing new, but the attack highlights some alarming trends.