Cyber attack at Visser Precision, which builds custom parts for the aerospace and automotive industries, reveals sensitive company data.
Here’s the first timeline of February covering the main cyber attacks occurred in the first half of this month. This fortnight I have collected quite a long list containing 97 events. ...
The Independent and Global Webzine Devoted to the International SAP Community – SAP Trends, Analysis, Strategies and in-depth Reports from Business and IT.
Government systems paralyzed by malware cause chaos. New research explores why are attacks so frequently successful.
Organisations are still falling victim to hackers, but a new report from FireEye suggests that data protection legislation has improved the response time to cyberattacks.
Ireland's Data Protection Commissioner, Helen Dixon, tells Adrian Weckler that criticism from Germany is …
We still have a long way to go to improve gender diversity in the security workforce. Here are nine tips for recruiting and retaining women in cybersecurity and STEM.
ENTSO-E, which ensures coordination of European electricity markets said Monday that its IT network had been compromised in a “cyber intrusion.”
Secret labs. Magic cures. Government plots. Despite efforts by social media companies to stop it, false information about the coronavirus is proliferating around the world.
At a Senate hearing, telecom officials gave recommendations to lawmakers who seek to restrict and replace telecom equipment deemed to pose a security risk.
Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.
There’s no year that goes by without hearing about a major cyberattack that wreaks havoc on society. Turning point events in cybersecurity have changed the way we approach online security ...
The playbook simulates a cyberattack on the energy industry to educate regulators, utilities, and IT and OT security experts.
Cybereason Nocturnus is investigating a campaign where attackers are trojanizing multiple hacking tools with njRat, allowing the attackers to completely take over the victim’s machine.