Cyberattack
Read how security concerns raised by an alleged security breach at Oracle Cloud appear legitimate, despite the company’s denial.
Lehigh Valley Health Network settles a class action for $65 million after a ransomware attack exposed patient data, including sensitive medical records and images.
Learn about Infosys McCamish’s settlement of lawsuits over a ransomware attack that exposed the data of over 6 million individuals.
Learn why cybersecurity automation is key to protecting against rising threats, enabling faster threat detection, intelligence sharing, and stronger defenses.
Russian hackers are exploiting the Signal Messenger “linked devices” feature to spy on sensitive communications, posing a growing cybersecurity threat worldwide.
Learn more about how hackers use Google Calendar to spread malware through fake invites and phishing links, tricking users into revealing personal information.
Microsoft warns that North Korean group Kimsuky is using ClickFix tactics to target government and NGO officials through spear-phishing attacks.
Read how scammers are using snailmail to send fake ransomware demands, claiming that data breaches have occurred and demanding Bitcoin payments.
Hackers are ditching traditional phishing for mobile-first attacks like smishing, quishing, and Wi-Fi phishing. Are businesses ready for the new threat landscape?
Third-party disruptions can have major consequences. Avoid risks by recognizing weak vendors’ business continuity plans before they affect your operations.
Daily Updates
Sign up for our free daily newsletter for the latest news and business legal developments.