Twilio has been hacked by a relentless threat actor who successfully tricked employees into giving up login credentials that were then used to steal third-party customer data. [Read More]
Convenience store chain, 7-Eleven, said that it had closed its outlets in Denmark after a suspected hacker attack knocked out their cash tills. [Read More]
A cyberespionage operation aimed at industrial enterprises and public institutions in Russia and Ukraine has been linked to a Chinese threat actor. [Read More]
BTC-e operator Alexander Vinnik, a Russian citizen, has been extradited by Greece to the United States hours after his release from a French jail. [Read More]
Texas startup Ghost Security emerged from stealth this week with $15 million in investments from 468 Capital, DNX Ventures, and Munich Re Ventures. [Read More]
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
Malware and targeted attacks on operating systems and firmware have become increasingly destructive in nature, and these more nefarious attack methods are rising in prevalence.
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
In the event of Russian cyberwarfare, reviewing the industries, styles, and objectives of their attacks can help organizations to prepare and implement more robust defenses.
Botnets have become a fixture in the threat landscape, and are in a state of evolution as they learn and use newer, more evolved cybercriminal attack techniques.