Ransomware

What Are the Riskiest Connected Devices in 2024?
Endpoint & Device Security What Are the Riskiest Connected Devices in 2024?

The year 2024 presents a rapidly evolving cyber-threat landscape that organizations must navigate with vigilance. A comprehensive examination by Forescout Research - Vedere Labs reveals distinct cyber risks across various categories of connected devices. From Information Technology (IT)

UK Introduces Bill to Boost Cyber Resilience in Public Services and NHS
Infrastructure & Network Security UK Introduces Bill to Boost Cyber Resilience in Public Services and NHS

In an ambitious move to protect the nation's critical services from the growing threat of cyber attacks, the UK has introduced the Cyber Security and Resilience Bill. Announced in the King's Speech in July 2024, the bill is directly aimed at enhancing cyber defenses for public services, including

How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios?
Infrastructure & Network Security How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios?

How Are Ox Thief’s Extortion Tactics Changing Ransomware Scenarios? The shadowy world of ransomware continues to evolve, with cybercriminals developing increasingly sophisticated techniques to pressure victims into paying ransoms. The emergence of Ox Thief, a recently identified extortion group,

FortiGate Firewalls Under Attack: Urgent Security Measures Advised
Malware & Threats FortiGate Firewalls Under Attack: Urgent Security Measures Advised

In a concerning development for cybersecurity, Arctic Wolf has issued a critical warning regarding ongoing malicious activities targeting management interfaces of FortiGate firewall devices exposed to the public internet. The attacks, which reportedly started in early December of last year, have

Bolstering Cybersecurity in Manufacturing: Strategies for CISOs
Infrastructure & Network Security Bolstering Cybersecurity in Manufacturing: Strategies for CISOs

The manufacturing sector has increasingly embraced the integration of Information Technology (IT) with Operational Technology (OT) to drive efficiencies and streamline operations. However, this convergence comes with its own set of cybersecurity challenges, exposing manufacturers to heightened

Is the US Cyber Pause a Diplomatic Move Amid Rising Cyber Threats?
Security Operations & Management Is the US Cyber Pause a Diplomatic Move Amid Rising Cyber Threats?

The recent directive from US Defense Secretary Pete Hegseth to pause US Cyber Command's offensive operations against Russia has sparked considerable debate and analysis. This strategic decision is viewed as part of the Trump administration's efforts to bring Russia to the negotiation table amidst

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later