August 26, 2016
Via: CSO OnlineAfter a company has been hacked and the hack has been discovered to be a harmful one, top executives and IT leaders normally huddle in a room to assess the loss. It’s usually not a pretty scene. It’s not as […]
August 24, 2016
Via: CSO OnlineFew would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have a true sense of the full impact on the organization? […]
August 23, 2016
Via: CSO OnlineApplication layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says. One such attack generated 8.7Gbps at its peak, “unheard of […]
August 22, 2016
Via: CSO OnlineYou might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don’t need to target software or use fancy tactics to ruin a network and compromise sensitive data. Josh Abraham, a practice […]
April 17, 2015
Via: cyber-crimePawn Storm, the long-standing economic and political #cyber–#espionage operation that has been first detailed in October 2014, continues unabated. Aiming to compromise the targets’ computers and Outlook accounts, the attackers send spear-phishing emails carrying malware and compromise websites to redirect […]
April 24, 2024
April 25, 2024