The Latest in IT Security

Posts Tagged ‘Attackers’

Three-fourths of physicians use more than one mobile device for work, a new study shows.  One in five doctors’ mobile devices are at high risk of attack, according to a new study. Medical professionals have become savvy tech users: 99% of doctors use mobile devices as of 2015 and the number of doctors using more […]

Read more ...

Pirates used hacked information from a global shipping company’s servers to target and capture cargo ships on the high seas, and a water utility’s valves and ducts were hijacked: these are some of the more dramatic scenarios representing cases Verizon’s breach team investigated in the past year.

Read more ...

TU-SO further elaborated that in the past year “the threat actors accessed the target environment using compromised credentials and the companies’ own virtual private network (VPN) or other remote access solutions.” The research team also noted that threat actors were “living off the land,” using credentials, systems and tools they collected along the way instead […]

Read more ...


Categories

TUESDAY, MARCH 11, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments