Security researchers uncovered vulnerabilities affecting the speculative execution feature of Intel CPUs, similar to Spectre and Meltdown. Here's what you need to know.
Fortnite: Battle Royale, Epic Games' massively popular online game, is being released on Android, but not on Google Play Store. Does it pose a security risk?
Data breaches take time and a lot of effort to pull off, but successful breaches can affect not just organizations, but also millions of people. Learn what a data breach is, what types of data is usually stolen, and what happens to stolen data.
With today’s ever-evolving threat landscape, data breaches are no longer isolated cases. Responding to and remediating data breaches calls for a proactive approach — something that managed detection and response (MDR) can provide.
Security researchers uncovered a cryptojacking campaign that exploits a vulnerability in MikroTik routers to inject a malicious version of Coinhive. Here’s what you need to know.
Security researchers uncovered that a version of Jigsaw, an old ransomware, has resurfaced as a bitcoin stealer. Its operators have already netted 8.4 bitcoins (US$66,807 as of July 24, 2018) using the repurposed malware.