Third-party cyber threats are nothing new, but they’re growing in sophistication and impact. In September, a self-replicating worm called Shai-Hulud emerged as one of the first successful worm-driven ...
Worse than telemarketers are the bad guys who use voicemail or a phone call as a phishing attack. In a process known as ...
Real-time phishing relay attacks are now the most dangerous and effective weapon in the modern cybercriminal’s arsenal. They ...
This is Part 1 of a 2-part series titled The Complete Guide to Reducing Cyber Incident Response Costs in the Legal Industry. Download the guide here. In our global, digital-first economy, cyberattacks ...
Four people, including three teenagers, have been arrested in connection with cyber attacks on Marks & Spencer, Co-op and Harrods, in April this year. The attacks, believed to have been carried out by ...
Abstract "Double-extortion" ransomware attacks not only encrypt systems but also steal sensitive data. Traditional backups ...
During the holiday season—specifically, Christmas Eve, Christmas, New Year’s Eve and New Year’s Day—there tends to be a spike in cyber attacks on companies. Cyber attackers target this time of year ...
Overview:  Most cyber attacks happen thanks to simple human mistakes, not weak technology.Better training and awareness can ...
When Optus, Medibank and non-bank lender Latitude Financial were hit by separate cyber attacks in the past few years, ...