Cisco calls business email compromise 'the most lucrative and profitable method to extract large amounts of money from a business.'
Cisco's midyear 2017 security report isn't all doom and gloom and shows a number of positive trends.
AlphaBay was responsible for at least $1 billion in transactions over the past three years.
The makers of Cyber Security Investigator for Splunk attract millions in VC funding as it eyes other markets.
The vulnerability can be exploited to view a device's video feed or to deny the owner access to the feed.
Names, addresses, account information, email addresses, and the last four digits of credit card numbers were accessible online.
The startup's Corelight Sensor product uses the open-source Bro security monitoring and network analysis platform to help businesses quickly resolve incidents.
The incident was 'a deliberate act by an employee,' the company's managing director said.
The company's new dynamic firewall technology ensures that only legitimate traffic gets through.
The mainframe has long been where mission-critical information is handled and now at long last all the information will be encrypted too.
Researcher Chris Vickery found customer names, addresses, account details and PINs on a publicly accessible server.
While the hotel chains themselves weren't targeted, their use of the SynXis reservations system exposed them to the breach.
Russian security firm shoots back at critics that allege inappropriate ties with Putin government.
1,900 Avanti kiosks were affected, and B&B was hit for a two-year period from 2015 to 2017.
A total of 54 flaws in total are now patched, including a critical issue in the HoloLens VR technology.
A misconfigured Amazon S3 bucket exposed millions of names, email addresses, phone numbers, mailing addresses and demographic information.
Virtual private networks (VPNs) come with many different protocols and features, so choosing the best one for your organization requires some research. We outline your options.
Sixty percent of cyber security pros expect a successful attack on U.S. critical infrastructure within the next two years, a recent survey found.