End-to-end encryption email service ProtonMail learned a costly lesson about cyber ransom tactics: just because hackers demanded a ransom, it doesn’t mean the attacks are going to stop once you pay up.
Well-designed attacks proceed in six components that show how attackers progress within their targets. Learn about the components that make for a successful campaign to know how to form a proper threat response plan.
UK internet provider TalkTalk has reported a breach, saying that hackers may have accessed and stolen a large quantity of data—not all of which were encrypted—before it was realized.
This latest entry on our series of articles on targeted attacks discusses how a targeted attack can impact not only the targeted organization, but also its customers
The objective of spear phishing and phishing are ultimately the same—to trick a target into opening an attachment or click on a malicious embedded link. But what is spear phishing? Learn more from this article.
What is a targeted attack? What counts as one? What's the potential damage, and how can they be prevented? Here's what they truly are about, and why they need to be secured against.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.