The Latest in IT Security

1

The number of victims that ransomware groups posted on their data leak sites increased by 50% last year according to an analysis by researchers from Palo Alto Networks. Twenty-five new groups also appeared last year but some of them had a short life until they disbanded or rebranded. Noteworthy trends include the use of exploits […]

Read more ...

1

Schneider Electric built its business on manufacturing circuit breakers and other electrical parts, but nowadays it also helps clients go green. The company collects data from more than 2,000 companies in its Resource Advisor software to track energy consumption, emissions and their overall sustainability scores. The company said Tuesday that a ransomware attack has locked […]

Read more ...

1

When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) […]

Read more ...


Categories

WEDNESDAY, NOVEMBER 13, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments