News
Following RansomHub’s mysterious exit, the Threat Response Unit (TRU) at eSentire identified a new threat actor, dubbed ShadowCoil, believed to be an ex-affiliate of the RansomHub operation.
As cyberattacks on healthcare systems grow in scale and severity, they can’t be seen as a simple IT matter. With breaches involving sensitive patient data carrying consequences that are deeply ...
Active Directory credentials are as valuable as the crown jewels, so why are so many teams treating them like an afterthought? By Eric Clay ...
A hacker was able to extract basic profile information from a third-party, cloud-based Customer Relationship Management system used by Cisco.
As businesses embrace hybrid multi-cloud environments, addressing these challenges will be critical to maintaining security &driving business success.
Despite growing up in a hyper-connected world, many Gen Zers neglect basic security practices, potentially exposing themselves to cyber risks.
Upon discovering a ransom note, businesses face the critical decision of whether to remain silent or engage with the threat actors. By Dan Saunders ...
No tools or training can replace situational awareness and real-time visibility across your entire digital infrastructure. By John McLoughlin ...
Around 70 per cent of the world’s online population has their personally identifiable data collected - often without explicit consent or awareness.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results