The threat group known as The Dark Overlord has claimed responsibility for a law firm data breach involving files allegedly related to the 9/11 terrorist attacks.
By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.
Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
The risks associated with failure to establish proactive data compliance go far beyond regulatory violations and loss of consumer trust. Compliance is critical for secure digital transformation.
Security researchers discovered that several new malware strains are targeting known Cloudera Hadoop vulnerabilities for bitcoin mining and distributed denial-of-service (DDoS) purposes.
Getting an increase security budget approved is one thing; spending it effectively is another challenge altogether. Follow these tips to get the most value out of your SOC's funds.
Security researchers reported that a new bot called DemonBot is targeting Hadoop clusters to execute distributed denial-of-service (DDoS) attacks.
A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.