Trends

SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

Cybercriminals leveraging the SolarMarker .NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials an...

Multi-Party Cyberattacks Lead to Big Losses: Security Researchers

The attacks on SolarWinds and Kaseya over the past year put a spotlight on how an attack on a single company can have downstream consequences on the victim’s partners and customers. The attackers u...

ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom

The bulk of companies hit by ransomware are deciding that paying the ransom is the best and fastest way to get their businesses back online, despite growing pressure from the federal government and so...

CNAP Platforms: The Next Evolution of Cloud Security

Businesses have far more cloud security options than they once did, making clouds often as safe as, if not safer than, on-premises solutions. Still, cloud security has grown increasingly complicate...

After Springhill: Assessing the Impact of Ransomware Lawsuits

A lawsuit working its way through the courts could have a lot to say about the liabilities facing organizations that have been hit by ransomware attacks – and could have implications for cybersecurity...

Becoming a Cybercriminal Keeps Getting Easier

Zero-day vulnerabilities are no longer exclusively for elite hackers. There are now automated scripts available on GitHub so even novice hackers can explore these previously unknown security flaws. ...

Preparing for Ransomware: Are Backups Enough?

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component ...

How to Get Started in a Cybersecurity Career

There just aren't enough cybersecurity pros to go around, meaning that people with the right skills and enough dedication have plenty of opportunities to land rewarding and lucrative jobs. And with th...

Cybersecurity Risks of 5G – And How to Control Them

5G is on the cusp of widespread adoption. Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn't come with...

Zero Trust Can’t Protect Everything. Here’s What You Need to Watch.

Zero trust architecture is an emerging technology in cybersecurity that offers an alternative to the traditional castle-and-moat approach to security. Instead of focusing only on your perimeter to de...

Latest articles