Ransomware

What is Magecart and was it behind the Ticketmaster and BA hacks?

The phenomenally damaging cyberattack on British Airways last week saw the haemorrhaging of information from over 385,000 transactions, credit card and personal details included.

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

Disinformation poses a serious threat; and here comes AaaS

Lies and fake news are coming after your company’s brand and reputation. Time to get your AaaS in gear.

Don’t let data security be your Achilles heel in transformation

The ruthless rampage of Cyberattacks is a worrying trend that threatens organizations of all scale. However, it should not slow down the adoption of latest technology offerings. Instead, devise strategies to ensure that security is met along your transformation journey.

The curious case of the Superdrug 'hack'

Earlier this week high street retailer Superdrug was contacted by a lone hacker claiming that they had stolen the personal information of up to 20,000 customers and demanded a ransom in exchange for the information. This included customers' names, addresses, and other personal details, but no payment or card information.

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

Trend Micro’s ‘Virtual Patching’ to help protect enterprises against advanced cyberattacks

A non-disruptive approach to security, without deploying in-guest security agents.

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

Partner Content
Email-borne cyber attacks: A constant security threat

The sheer widespread usage of e-mails, both on a personal and on a professional basis by sheer billions of people, means hackers and cyber criminals can target multiple people at once.

Partner Content
Bharat Vikas Group streamlines administrative control and combats malware attacks with Seqrite EPS

One of the major concerns analyzed by the IT and Security team of BVG India Ltd. was malware and ransomware attacks. The suspected reasons behind these attacks were phishing emails or unauthorized web browsing. 

Partner Content
Unstructured data: The unseen dangers

Unstructured data refers to raw and organized data that cannot be stored in predefined relationship structures.

Partner Content
3 Common Problems in Vulnerability Management

Vulnerability management is a key process in any information security program and regulatory compliance framework. Why is it that many companies lag behind on patches and updating their systems?