Data breaches cost US companies more than $1.2 trillion last year

Data breaches cost US companies more than $1.2 trillion last year

A data breach can inflict pain on an organization by stealing and leaking sensitive information. With user or customer accounts compromised, a company can suffer…

View More Data breaches cost US companies more than $1.2 trillion last year
EasyJet Admits Nine Million Customers Hacked

EasyJet Admits Nine Million Customers Hacked

EasyJet has admitted that a “highly sophisticated cyber-attack” has affected approximately nine million customers. It said email addresses and travel details had been stolen and…

View More EasyJet Admits Nine Million Customers Hacked
How Fraudulent Domains 'Hide in Plain Sight'

How Fraudulent Domains ‘Hide in Plain Sight’

Cybercriminals use new types of top-level domains, topical keywords, and targeted emails to trick victims into clicking malicious links. Domain fraud is an old cybersecurity…

View More How Fraudulent Domains ‘Hide in Plain Sight’
Single Malicious GIF Opened Microsoft Teams to Nasty Attack

Single Malicious GIF Opened Microsoft Teams to Nasty Attack

Microsoft has fixed a subdomain takeover vulnerability in its collaboration platform Microsoft Teams that could have allowed an inside attacker to weaponize a single GIF…

View More Single Malicious GIF Opened Microsoft Teams to Nasty Attack
6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Sixty-three percent of IT security professionals say the frequency of attacks has gone up over the past 12 months, according to Ponemon’s 2018 State of Endpoint Security…

View More 6 ways malware can bypass endpoint protection
Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro

Breach of India-based outsourcing giant involved a remote access tool and a post-exploitation tool, according to an analysis by Flashpoint. The breach of outsourcing firm…

View More Attackers Used Red-Team, Pen-Testing Tools to Hack Wipro
New Security Warning Issued For Google's 1.5 Billion Gmail And Calendar Users

New Security Warning Issued For Google’s 1.5 Billion Gmail And Calendar Users

Google’s Gmail email service is used by upwards of 1.5 billion people. The Google Calendar app, meanwhile, has been downloaded more than a billion times…

View More New Security Warning Issued For Google’s 1.5 Billion Gmail And Calendar Users
Coronavirus-themed spam surged 14,000% in two weeks says IBM

Coronavirus-themed spam surged 14,000% in two weeks says IBM

Since February, spam exploiting the novel coronavirus has jumped by 4,300% and 14,000% in the past 14 days, according to IBM X-Force, IBM’s threat intelligence…

View More Coronavirus-themed spam surged 14,000% in two weeks says IBM
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches
Cyber Kill Chain - Lockheed Martin

Cyber Kill Chain – Lockheed Martin

Security incidents are events that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them…

View More Cyber Kill Chain – Lockheed Martin