The Latest in IT Security

1

Malware used in a crippling cyberattacks against an Iranian steel plants last week is connected to an attack that shut down the country’s rail system last year. In both cases, on malware strain was used to impact physical and critical infrastructure, according to a report from Check Point Research. The overlaps in the code, combined […]

Read more ...

1

Surviving ransomware is possible with a combination of preparation and intentionality. Often, there is a misguided characterization of ransomware attacks that implies defenders either completely thwart an attack or that attackers establish complete control of their targets’ IT infrastructure. But the past couple of years have illustrated that defenders’ success in dealing with ransomware attacks […]

Read more ...

1

Dubbed ZouRAT, the malware has been deployed on devices in North America and Europe, as part of a sophisticated campaign targeting remote workers, which might have been conducted by a state-sponsored threat actor. At least 80 entities might have been impacted, the researchers estimate. The attacks, which started in October 2020, targeted known vulnerabilities in […]

Read more ...


Categories

FRIDAY, APRIL 04, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments