You Searched For "cyberattack detection" and got 20 results
Sort By:
A recent study suggests companies are vulnerable to cyberattacks after layoffs. Here's how they can avoid costly data breaches.
A recent study suggests layoffs can lead to cyberattacks by ex-employees. Here's how companies can …
Erica Sweeney
Managed Detection and Response Services – an effective defense to knockout sophisticated cyberattacks
Modern organizations of all sizes can rest easy with Sophos Managed Threat Response (MTR) Services …
FTC Chairwoman Lina Khan reportedly had to write her credit card number on a piece of paper to check in at the MGM Grand when its computers were down in the cyberattack
The Federal Trade Commission chair reportedly had to write her credit card information on a piece o…
Jordan Hart
Russia will have to rely on nukes, cyberattacks, and China since its military is being thrashed in Ukraine, US intel director says
Russia will need to rebuild its military due to high losses, botched strategies, and wasted resourc…
Chris Panella,John Haltiwanger
A DeFi hacker compromised a lesser-known protocol but forgot to take their winnings
Hackers can cause devastating losses to decentralized finance (DeFi) platforms, but sometimes they …
Okta plunges after hackers claim cyberattack that puts thousands of the company's business customers at risk
Okta CEO Todd McKinnon took to Twitter and said there was no evidence of any ongoing malicious acti…
Phil Rosen
5 of the most common cyberattacks, from 'injection' to 'brute force' hacks — and how they've been used in past conflicts
As Russia escalates its ground invasion of Ukraine, it may also employ massive and debilitating cyb…
Avery Hartmans
Ukraine accuses Russia of waging a 'hybrid war'
The cyberattack on multiple Ukrainian government agencies happened under the looming threat that Ru…
Sarah Al-Arshani
Cyberattacks threaten the corporate world. Here's what companies need to know about what comes next.
Cyberattacks threaten reputation, mergers and acquisitions, corporate valuation, the ability to rai…
Stephen Lawton
What to know about the growing threat of ransomware attacks and their impact on companies of all sizes
As ransomware attacks become more aggressive and common, companies must reevaluate their cybersecur…
Stephen Lawton
A string of top accounts on the new pro-Trump app GETTR were hacked and defaced on its July 4 launch day, and the person claiming to be the hacker says the site still has several security bugs
Marjorie Taylor Greene, Mike Pompeo, and Newsmax all had their pages hacked, as did the app's found…
Joshua Zitser
Security experts are 'freaking out' about how foreign hackers carried out the 'most pristine espionage effort' in modern history right under the US's nose
"This could just be the tip of the iceberg," said a former NSA analyst. "No one had a solution to p…
Sonam Sheth
72% of cyberattacks related to COVID-19 coming via fake emails
As cyberattacks grow in magnitude globally including in India, cyber criminals now prefer to use Co…
North Korean hackers tried to trick COVID-19 vaccine makers by posing as WHO officials
North Korean hacking group Cerium, which posed as WHO officials, were one of three state-backed gro…
Isobel Asher Hamilton
Another Indian pharmaceutical giant reports cybersecurity breach within two weeks of ransomware hack on Dr Reddy’s
Another leading Indian pharmaceutical, Lupin, has reported a cybersecurity attack on its IT systems…
A hacker just stole over $600 million in crypto. Experts explain the historic swindle and why cyberattacks shouldn't discourage adoption of digital assets.
Experts said the $600 million crypto swindle that hit Axie Infinity's Ronin Network isn't the block…
Phil Rosen
Trump confirms he ordered a cyberattack on a notorious Russian troll farm during the 2018 midterms
Trump confirms the US launched a cyberattack on the Internet Research Agency, an infamous Russian t…
Isobel Asher Hamilton
SBI warns 2 million users may be at risk of phishing attacks in Delhi, Mumbai and other major cities
According to the warning issued by the Computer Emergency Response Team - India (CERT-In) — Indi…
Kim Jong Un has quietly built a 7,000-man cyber army that gives North Korea an edge nuclear weapons don't
North Korea's cyber army is trained to find secrets, disrupt critical infrastructure, and steal mon…
Ellen Ioanes
Don’t buy new laptops, invest in virtual machines to protect against cyberattacks — suggests cybersecurity expert
The coronavirus pandemic and the new work-from-home model has every enterprise thinking about cyber…