by

UK Authorities Arrest Suspected Hacker in the Scattered Spider Group Linked to MGM Attack

Authorities in the UK have arrested a 17-year-old for his alleged connections to the cybercrime group Scattered Spider. Find out more about the development and...

Read More →

by

What Is Acceptable Use Policy (AUP)? Definition, Elements, Importance, Examples, and Best Practices

Acceptable Use Policies (AUPs) are rules for using company technology and data responsibly and safely. In this article, learn more about what they are, the key...

Read More →

by

Faulty CrowdStrike Update Leads to Global Microsoft Outage

A faulty update by CrowdStrike created a massive worldwide outage across Microsoft Windows systems. Thousands of people and businesses witnessed system crashes...

Read More →

by

Russian Antivirus Provider Kaspersky Lab Pulls Out of the US Market

Russian antivirus provider Kaspersky Lab has announced plans to leave the US market owing to the Biden administration’s ban on the sales and distribution...

Read More →

by

Atlassian Releases Patches for Critical Vulnerabilities in Server and Data Center Products

Atlassian has released patches for high-severity vulnerabilities in its Jira, Confluence, Bitbucket, and Bamboo server and data center products. Learn more...

Read More →

by

CDK Global Outage Ended After Reportedly Paying $25 Million Ransom

CDK Global, a software service provider serving car dealerships across the US, appears to have paid the hackers a $25 million ransom. Learn more about the...

Read More →

by

Over 50% of Employees Fear Reporting Cybersecurity Mistakes Finds ThinkCyber Study

A new study by ThinkCyber has found that most employees feel underprepared to deal with security risks at their organizations. Find out more about the study,...

Read More →

by

Google To Expand Its Market Share in Cloud Security by Acquiring Wiz for $23 Billion

Alphabet Inc. plans to acquire cybersecurity startup Wiz Inc. for a hefty $23 billion. The move is likely to help it compete with Microsoft and Amazon. Find...

Read More →

by

Massive Breach Compromises Call Records of Millions of AT&T Customers, Snowflake .sellerRatings a:visited .sellerRatings a:visited

AT&T, one of the leading telecom companies in the United States, has been impacted by a significant data breach. Call and text records of nearly all of...

Read More →

by

Proposed CISA Rule for Reporting Cyberattacks Faces Resistance

The CISA’s new proposed rule that makes it mandatory to report cyberattacks to the federal government is facing resistance from multiple sectors. Find...

Read More →

by

Cisco Talos Report Reveals Critical Insights in Ransomware Trends

Cisco Talos Intelligence has published a detailed analysis of ransomware tactics, techniques, and procedures (TTPs) used by prominent ransomware groups. Learn...

Read More →

by

What Is a Hardware Security Module (HSM)? Working, Use Cases, and Best Practices

Safeguarding sensitive information is more crucial than ever. With evolving threats, traditional security measures might not be enough. This comprehensive...

Read More →

Close Search Window
Close