Author: admin

IoT devices and routers at risk due to BotenaGo malware

A new malware variant, BotenaGo, could potentially impact millions of IoT devices and routers after its authors published the source code online.

Continue Reading

2021 was a record-setting year for data breaches; what’s next?

The ITRC recently released its annual data breach report, covering dramatic trends in cybersecurity. Here’s what you need to know for 2022.

Continue Reading

The risks of open-source software

Most companies and software products utilize open-source code, but these components come with a plethora of security risks.

Continue Reading
Kronos hit by ransomware, crippling its HR services

Kronos hit by ransomware, crippling its HR services

Kronos, a massive HR management platform, was recently hit by a ransomware attack, leading to data theft and payroll delays for thousands.

Continue Reading
Data breaches: what are the causes and consequences?

Data breaches: what are the causes and consequences?

To help your organization improve its cybersecurity, we go over the main causes and risks of data breaches.

Continue Reading
The biggest ransomware attacks in 2021

The biggest ransomware attacks in 2021

Here’s a timeline of the biggest ransomware attacks we saw in 2021.

Continue Reading

Cybersecurity trends to look out for in 2022

As we move into 2022, be aware of these emerging trends in cybersecurity.

Continue Reading

Hackers are exploiting a critical vulnerability in the Log4j Java library

A critical vulnerability in Apache’s Log4j Java library leaves companies scrambling to defend against hackers.

Continue Reading

Health care organizations fall victim to data breaches

Here’s a look at how health care organizations are falling victim to data breaches.

Continue Reading

Academic institutions brimming with PII come under attack

Academic institutions and clearinghouses that keep large volumes exposed to the internet will do well to think critically about best practices for securing reams of student data with reliable tools.

Continue Reading