Roundup: The top ransomware stories of 2024
2 min read - The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure…
Cybersecurity trends: IBM’s predictions for 2023
4 min read - As with many other aspects of life and business, 2022 held fewer overall surprises in cybersecurity than in recent years — thank goodness. Instead, many trends brewing over the past few years began to take clearer form. Some were unexpected,…
Only half of small businesses are prepared for cyberattacks
2 min read - A recent survey showed that only half of small businesses are ready to handle a cyberattack, even though the threat of one is a top concern. Small businesses can take action ahead of time to reduce their risk and increase…
The 5 Most Hotly Contested Security Trends and Questions
4 min read - The worst thing that organizations can do is take a hard stance with their cybersecurity efforts. The digital threat landscape is constantly evolving. If organizations settle into a viewpoint, they could elevate one source of risk into something unrealistic—all while…
Cybersecurity Trends and Emerging Threats in 2021
4 min read - The year 2021 is finally here, bringing with it the promise of a brighter future — but a long road ahead. In this piece, we’ll dive into five cybersecurity trends that pose significant potential risk in 2021 and offer practical…
What the data is telling us about the current rise in security threats during the COVID-19 pandemic
5 min read - IBM X-Force Research has been seeing a significant number of new malicious domains related to COVID-19 appear in the wild since late February 2020, based on Quad 9 data.
Weekly Security News Roundup: Dark_Nexus Vies for Supremacy on Compromised Machines
3 min read - A new IoT botnet called "dark_nexus" drew researchers' attention to its efforts to establish and maintain dominance on a compromised machine. Learn what else happened last week in security news.