Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
The practice of protecting network data with encryption is gaining steam, and with good reason. But companies need adequate network visibility to keep up with threats that evade traditional detection.
Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.
Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
Several major U.S. newspapers reported they were victims of production-disrupting cyberattacks that apparently involved Ryuk ransomware.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
In 2017 and 2018, threat actors used a toolkit called KoffeyMaker in multiple black box ATM attacks targeting Eastern European financial institutions.
The Marriott data breach could impact the personal information of approximately 500 million guests, including payment card data for about 327 million customers.
In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?