Over the weekend, the WannaCry ransomware variant cyber attack appears to be spreading across the globe as the number of victims have now surpassed 200,000 in over 150 countries.
A global cyber attack using WannaCrypt ransomware worm hit 74 countries, infecting hospitals, businesses, universities and other organizations.
The tenth edition of Verizon’s Data Breach Investigations Report (DBIR) for 2017 includes the latest data on real-world data breaches and security incidents investigated by Verizon or by one their data contributors (such as security vendors and law enforcement agencies). This year’s report also includes data specific to key industries and who targets such verticals and why.
As worldwide cyber threats keep growing, cyber criminals are constantly adapting their methods to attack organizations and evade detection. Standing on our own against such malicious attackers, most organizations don't have a chance without effective threat communication between the public and private sectors.
The owner of restaurant chain Shoney's, Best American Hospitality Corp. (BAHC), confirmed a data breach of customer data at dozens of Shoney's restaurants. The company published a press release that listed the affected restaurant locations and said…
In a recent cyber threat report, McAfee provided some good intelligence on how cybercriminals use Mirai attacks to infect poorly configured Internet of Things (IoT) devices and turn them into bots used for large scale network attacks.
In case you missed it, the Federal Trade Commission (FTC) released a video that explains how companies can leverage NIST's Cybersecurity Framework and FTC's own "Start with Security" guidelines to greatly improve security in their organization. In this article, we highlight the five key tenants from the framework and how they could have possibly prevented FTC action and penalties.
The Verizon security team recently announced the first Data Breach Digest, a series of 18 cybercrime cases the team investigated. The Verizon team starts with a sneak peek of one of the case studies that describes how a university was attacked by an IoT botnet consisting of over 5,000 infected hosts. The study concludes with 12 good lessons learned from the attack.
A new malware campaign was responsible for sending 23 million emails containing Locky ransomware in just 24 hours earlier this week.
To help IoT developers secure their products and fight future DDoS attacks, the Cloud Security Alliance (CSA) IoT Working Group issued a report titled "Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products."