The Latest in IT Security

1

Federal authorities shut down attempts by a Chinese government hacking group to attack U.S. critical infrastructure through a malware campaign that gained unauthorized access to “hundreds” of personally owned routers, FBI Director Christopher Wray testified Wednesday. The FBI conducted a court-authorized sting operation against the Chinese hacking group known as Volt Typhoon, which Wray said […]

Read more ...

1

Schneider Electric built its business on manufacturing circuit breakers and other electrical parts, but nowadays it also helps clients go green. The company collects data from more than 2,000 companies in its Resource Advisor software to track energy consumption, emissions and their overall sustainability scores. The company said Tuesday that a ransomware attack has locked […]

Read more ...

1

When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) […]

Read more ...


Categories

WEDNESDAY, APRIL 24, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments