We look at some of the defining moments in the threat landscape that helped steer organizations toward adding proactive incident response strategies to their cybersecurity defenses.
Data from five million credit and debit cards was put up for sale on the dark web last March 28. Security researchers investigating the sale traced the data back to Saks Faith Avenue and other stores under the Hudson's Bay company.
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.
The city of Allentown in Pennsylvania was hit with a costly malware attack. Reports point to the long-running Emotet malware as the culprit. The attack forced city officials to shut down some critical systems, and will also cost the city an estimated US$1 mill
Cybercriminals are already taking advantage of the news surrounding Meltdown and Spectre. SmokeLoader malware was spotted spreading via a fake patch for the vulnerabilities .
The source code of the Satori internet-of-things (IoT) botnet, pegged as Mirai's successor, was posted online on Pastebin. What does this mean in the IoT threat landscape, and what can users do against it?