Cyberattack

Oracle Cloud Security Breach Verified By News Outlet

Oracle Cloud Security Breach Verified By News Outlet

Read how security concerns raised by an alleged security breach at Oracle Cloud appear legitimate, despite the company’s denial.

Infosys McCamish Settles Class Actions Over 2023 Ransomware Attack

Infosys McCamish Settles Class Actions Over 2023 Ransomware Attack

Learn about Infosys McCamish’s settlement of lawsuits over a ransomware attack that exposed the data of over 6 million individuals.

Strengthening Cybersecurity Automation in the Financial Sector Against Rising Threats

Strengthening Cybersecurity Automation in the Financial Sector Against Rising Threats

Learn why cybersecurity automation is key to protecting against rising threats, enabling faster threat detection, intelligence sharing, and stronger defenses.

Russian State Threat Actors Targeting Signal Messenger Accounts

Russian State Threat Actors Targeting Signal Messenger Accounts

Russian hackers are exploiting the Signal Messenger “linked devices” feature to spy on sensitive communications, posing a growing cybersecurity threat worldwide.

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Hackers Still Exploiting Google Calendar in Phishing and Malware Attacks

Learn more about how hackers use Google Calendar to spread malware through fake invites and phishing links, tricking users into revealing personal information.

North Korean Hacker Group Uses ClickFix Tactics in Targeted Espionage

North Korean Hacker Group Uses ClickFix Tactics in Targeted Espionage

Microsoft warns that North Korean group Kimsuky is using ClickFix tactics to target government and NGO officials through spear-phishing attacks.

Snailmail Is the Oldest New Ransomware Threat

Snailmail Is the Oldest New Ransomware Threat

Read how scammers are using snailmail to send fake ransomware demands, claiming that data breaches have occurred and demanding Bitcoin payments.

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Beyond Phishing: The Rise of Mobile-Specific Cyber Threats

Hackers are ditching traditional phishing for mobile-first attacks like smishing, quishing, and Wi-Fi phishing. Are businesses ready for the new threat landscape?

Understand Your Vendors’ Business Continuity Plans to Track Risks

Understand Your Vendors’ Business Continuity Plans to Track Risks

Third-party disruptions can have major consequences. Avoid risks by recognizing weak vendors’ business continuity plans before they affect your operations.

Businesses Must Act To Counter the Rising Threat of AI-Driven Cyberattacks

Businesses Must Act To Counter the Rising Threat of AI-Driven Cyberattacks

Discover how AI-driven cyberattacks are more sophisticated and harder to stop while the lack of robust security measures leaves businesses vulnerable.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top