The Latest in IT Security

Posts Tagged ‘Hacking’

All organizations wrestle with chronic phishing attacks that are the primary vectors through which malicious actors breach systems and spread malware. Most phishing attackers deliver their payloads on networks by crafting spoofed emails that look like they come from legitimate, authoritative senders. Those look-alike emails instead derive from domains deployed solely for malicious purposes. It’s […]

Read more ...

Attackers don’t need to directly hack into a programmable logic controller (PLC) to wreak havoc on an industrial process: they can target its configuration files and pivot from there. Researchers over the past year have been exposing easily exploitable holes in the so-called project files that reside in industrial control system (ICS) software for PLCs. […]

Read more ...

Argentina’s largest telecom was recently hit by ransomware, with the attackers demanding a huge ransom, and setting a deadline for today. Telecom, a leading operator in the country, is being held for ransom by an unknown group of hackers, reports. The operators, presumed to be the infamous REvil group, demand $7.5 million in Monero, […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments