All You Need to Know About DNS Spoofing to Keep Your Organization Safe

This post is also available in: Danish The DNS in and of itself has never been secure. Being created in the 1980s when the Internet was a complete novelty, protection…

81% of UK Healthcare Organizations Hit by Ransomware in Last Year

81% of UK Healthcare Organizations Hit by Ransomware in Last Year More than four-fifths (81%) of UK healthcare organizations suffered a ransomware attack in the last year, according to a…

Brazilian insurance giant Porto Seguro hit by cyberattack

One of Brazil’s largest insurance groups, Porto Seguro has reported it suffered a cyberattack that resulted in instability to its service channels and some of its systems. The company reported…

Yanluowang Ransomware Targets Enterprise Entities

Researchers have discovered a new ransomware strain dubbed Yanluowang ransomware, that is still in the development process. Its targets? Enterprise entities. Yanluowang Ransomware: the Name Story The recent strain was…

The Complete Guide to IoT Security and What Every Business Owner Needs to Know

We might feel that technology plays an enormous role in our lives, always with our eyes on our phones or turning on the TV right after we got home –…

Acer Data Breach Impacts the Company’s Indian Systems

An Acer data breach on the company’s Indian after-sales services has been confirmed by the Taiwan-based multinational hardware and electronics enterprise. Who Is Behind the Acer Data Breach? According to…

Undercover FBI Agent Reveals Espionage Plans of Nuclear Engineer

Following the sell-out of data related to nuclear-powered warship design to an undercover FBI agent, a nuclear engineer together with his wife were imprisoned, being charged with espionage accusations that…

What is Spear Phishing? Definition, Examples, Prevention Strategies

What is spear phishing, you ask? Long story short, it’s a phishing technique that plays on the victim’s trust or, rather his gullibility. Spear phishing attacks are surgical, while general…

Apache Airflow Servers Leak Thousands of Credentials

Apache Airflow is one of the most popular open-source workflow management platforms. Researchers from Intezer have discovered while investigating a misconfiguration flaw in Apache Airflow a large number of exposed…

Insider Threat. Definition, Types, Examples and Prevention Strategies

You might think that you’re taking all security measures to protect your company, but have you ever considered that the danger might come from within? Insider threat is a very…